2005
DOI: 10.1007/978-3-540-30582-8_70
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of SIP Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
4

Year Published

2006
2006
2017
2017

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 6 publications
0
4
0
4
Order By: Relevance
“…It recalculates the user's credentials using the user's password stored in the Subscriber table. At this time, the attacker injected query in SIP header will attempt and change the user credentials in the SQL table [15]. It is also possible for a malicious user to attempt to employ SQL [16] commands such that, they make the database service useless and lead to a DoS on the SIP service.…”
Section: A Denial Of Service (Dos) Attackmentioning
confidence: 98%
“…It recalculates the user's credentials using the user's password stored in the Subscriber table. At this time, the attacker injected query in SIP header will attempt and change the user credentials in the SQL table [15]. It is also possible for a malicious user to attempt to employ SQL [16] commands such that, they make the database service useless and lead to a DoS on the SIP service.…”
Section: A Denial Of Service (Dos) Attackmentioning
confidence: 98%
“…, P s ) by using only the shared secret password k. It means that the Client authentication response f (k, realm, P c , s, β, α, P s )} in step (3) and the Server authentication response f (k, realm, P s , s, α, β, P c )} in step (4) just only defend on the password k. Unlike Wu et al's NAKE protocol, in order to overcome the off-line password guessing attacks in the improved NAKE protocol, since the Client authentication response f (k, DH k , realm, P c , s, β, α, P s )} in step (3) and the Server authentication response f (k, DH k , realm, P s , s, α, β, P c ) in step (4) To secure the DenningSacco attacks, we change the session key sk = xyP with sk = f (xyP ) by using secure one-way hash function in our improved NAKE protocol. Then, although an attacker obtains the shared session key sk = f (xyP ), he/she cannot obtain the Client's secret password k from the Client authentication response f (k, DH k , realm, P c , s, β, α, P s )} in step (3) and the Server authentication response f (k, DH k , realm, P s , s, α, β, P c ) in step (4) because f (·) is a secure one-way hash function by Definition 4.…”
Section: Definition 1 (Ecdlp: Elliptic Curve Discrete Logarithm Problmentioning
confidence: 99%
“…Then, although an attacker obtains the shared session key sk = f (xyP ), he/she cannot obtain the Client's secret password k from the Client authentication response f (k, DH k , realm, P c , s, β, α, P s )} in step (3) and the Server authentication response f (k, DH k , realm, P s , s, α, β, P c ) in step (4) because f (·) is a secure one-way hash function by Definition 4. It means that the attacker cannot get the Diffie-Hellman key DH k = xyP by using the shared session key sk = f (xyP ) because of one-way property.…”
Section: Definition 1 (Ecdlp: Elliptic Curve Discrete Logarithm Problmentioning
confidence: 99%
“…Over the years, a number of authentication schemes aiming to replace Digest Authentication have been proposed, using such basic blocks as Diffie Hellman [211], Elliptic Curve Diffie Hellman (ECDH) [212], Elliptic Curve Discrete Logarithm Problem (ECDLP) [213], nonces [214], PKI [215], [216] hash functions [217], and others [218], not all of them secure [219].…”
Section: ) Authentication Protocols (15 Items)mentioning
confidence: 99%