Abstract | ||
---|---|---|
SIP is among the most popular Voice over IP signaling protocols. Its deployment in live scenarios showed vulnerability to attacks defined as signaling attacks. These attacks are used to tear down a session or manipulate its parameters. In this paper we present a security mechanism that protects SIP sessions against such attacks. The mechanism uses SIP fingerprint to authenticate messages, in order to prevent spoofing. We validate our mechanism using Openssl and Sipp and show that it is light and robust. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1109/NTMS.2014.6814017 | New Technologies, Mobility and Security |
Keywords | Field | DocType |
Internet telephony,message authentication,signalling protocols,Openssl,SIP fingerprint,SIP sessions,Sipp,live scenarios,message authentication,security mechanism,signaling attacks,voice over IP signaling protocols | Authentication,Software deployment,Spoofing attack,Computer science,Computer security,End-to-end principle,Computer network,Fingerprint,Vulnerability,Voice over IP | Conference |
ISSN | Citations | PageRank |
2157-4952 | 1 | 0.36 |
References | Authors | |
9 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Khaled Dassouki | 1 | 1 | 0.36 |
Haïdar Safa | 2 | 56 | 9.85 |
Abbas Hijazi | 3 | 12 | 3.31 |