2009
DOI: 10.1002/9780470516997
|View full text |Cite
|
Sign up to set email alerts
|

SIP Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 43 publications
(45 citation statements)
references
References 0 publications
0
45
0
Order By: Relevance
“…Sisalem et al [169] provide an in-depth description of SIP and IMS, discussing the security mechanisms available in each part of the architecture. The focus particularly on the DoS and SPIT threats, also describing some available countermeasures.…”
Section: A) General Overviews (42 Items)mentioning
confidence: 99%
“…Sisalem et al [169] provide an in-depth description of SIP and IMS, discussing the security mechanisms available in each part of the architecture. The focus particularly on the DoS and SPIT threats, also describing some available countermeasures.…”
Section: A) General Overviews (42 Items)mentioning
confidence: 99%
“…In the event that client and vendor want to reduce the visibility of the information even more so that the broker cannot see it, they could use the messages of a payment either to transport a key transport protocol (the client could send a symmetric key encrypted with the public key of the vendor) or perform a key agreement exchange, negotiating other symmetric keys to perform the payment exchange or use an SSL/TLS channel or IPsec [38,39].…”
Section: Visibilitymentioning
confidence: 99%
“…In the event of non-repudiation being needed, the purchase protocol could be extended by substituting the "signature" based on HMAC by an electronic signature based on public-key cryptography or using S/MIME headers to sign the SIP messages [38,39].…”
Section: Non-repudiationmentioning
confidence: 99%
“…Figure 2 illustrates a basic session establishment in the IMS with the caller and callee roaming to foreign networks. The example is based on the scenario provided in (Sisalem et al 2009) .The session establishment in IMS is triggered by the sending of an INVITE request. In general, the session establishment can be considered as consisting of five phases, namely: …”
Section: Non-invite-retransmissionsmentioning
confidence: 99%