Publication detail

Secure Authentication and Key Establishment in the SIP Architecture

MALINA, L. ZUKAL, M.

Original Title

Secure Authentication and Key Establishment in the SIP Architecture

English Title

Secure Authentication and Key Establishment in the SIP Architecture

Type

conference paper

Language

en

Original Abstract

The article deals with the security features of SIP and focuses on advanced authentication and key establishment methods. These methods are described and a proposal of comprehensive security for the SIP architecture is presented in this article. The solution provides strong secure authentication of SIP users and protects against various attacks occurring in the SIP architecture. Our proposal is implemented and tested. The experimental results from our proof of concept implementation are presented.

English abstract

The article deals with the security features of SIP and focuses on advanced authentication and key establishment methods. These methods are described and a proposal of comprehensive security for the SIP architecture is presented in this article. The solution provides strong secure authentication of SIP users and protects against various attacks occurring in the SIP architecture. Our proposal is implemented and tested. The experimental results from our proof of concept implementation are presented.

Keywords

authentication, key establishment, multimedia, security, SIP

RIV year

2011

Released

18.08.2011

ISBN

978-1-4577-1411-5

Book

34th International Conference on Telecommunications and Signal Processing (TSP 2011)

Pages from

1

Pages to

5

Pages count

5

Documents

BibTex


@inproceedings{BUT72965,
  author="Lukáš {Malina} and Martin {Zukal}",
  title="Secure Authentication and Key Establishment in the SIP Architecture",
  annote="The article deals with the security features of SIP and focuses on advanced authentication and key establishment
methods. These methods are described and a proposal of comprehensive security for the SIP architecture is presented in this
article. The solution provides strong secure authentication of SIP users and protects against various attacks occurring in
the SIP architecture. Our proposal is implemented
and tested. The experimental results from our proof of concept
implementation are presented.",
  booktitle="34th International Conference on Telecommunications and Signal Processing (TSP 2011)",
  chapter="72965",
  howpublished="print",
  year="2011",
  month="august",
  pages="1--5",
  type="conference paper"
}