An Improved Secure SIP Registration Mechanism to Avoid VoIP Threats

An Improved Secure SIP Registration Mechanism to Avoid VoIP Threats

Mohammed Rasol, Bassam Al Kasasbeh, Farah Al Adwan
Copyright: © 2016 |Pages: 12
DOI: 10.4018/IJCAC.2016040103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The session initiation protocol is one the most popular protocols that is used in Internet protocol multimedia subsystems and adopted by a wide range of networking vendors. This research suggests a secure distributed session initiation protocol-based architectural model that can be deployed in service provider data centers to maintain the service availability, scalability, and security. This research proposes a secure session initiation protocol model. It called the redundant session initiation protocol model, and used to stop denial of service attacks. The proposed techniques should provide robust and secure implementations against today's vulnerabilities. The primary consideration of the predefined network is to acquire reliable mechanisms that handle the private information regarding legitimate users. The authors tried to suggest a secure distributed SIP registration mechanism that can be deployed in service provider data centers to maintain the service availability, security and reduce SIP attacks like IP spoofing.
Article Preview
Top

2. Sip Protocol Overview

SIP is described in IETF RFC 3261 (Rosenberg, et al., 2003). It is defined as “an application-layer control protocol that can establish, modify, and terminate multimedia sessions (conferences) such as Internet telephony calls”. Habitually the word “SIP” is used to refer to a whole protocol family, which includes the SIP protocol itself as well as many other supporting protocols that are additionally needed to build Internet telephony applications like the real time protocol and domain name space protocol. It is an American Standard Code for Information Interchange (ASCII)/text based request-response protocol that works on a client-server model.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing