2002
DOI: 10.1109/mnet.2002.1081764
|View full text |Cite
|
Sign up to set email alerts
|

SIP security issues: the SIP authentication procedure and its processing load

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
56
0
1

Year Published

2009
2009
2019
2019

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 153 publications
(58 citation statements)
references
References 10 publications
1
56
0
1
Order By: Relevance
“…A conclusion similar to Salsano et al [196] is reached by Bilien [202] and Bilien et al [203], [204], who study the overhead in SIP call setup latency when using end-to-end and hop-by-hop security mechanisms. They consider protocols such as MIKEY, S/MIME, SRTP, TLS, and IPsec, concluding that the overall penalty of using full-strength cryptography is low.…”
Section: ) Performance Analysis (14 Items)supporting
confidence: 64%
See 1 more Smart Citation
“…A conclusion similar to Salsano et al [196] is reached by Bilien [202] and Bilien et al [203], [204], who study the overhead in SIP call setup latency when using end-to-end and hop-by-hop security mechanisms. They consider protocols such as MIKEY, S/MIME, SRTP, TLS, and IPsec, concluding that the overall penalty of using full-strength cryptography is low.…”
Section: ) Performance Analysis (14 Items)supporting
confidence: 64%
“…Salsano et al [196] give an overview of the various SIP security mechanisms (as of 2002), focusing particularly on the authentication component. They conduct an evaluation of the processing costs of SIP calls that involve authentication, under different transport, authentication and encryption scenarios.…”
Section: ) Performance Analysis (14 Items)mentioning
confidence: 99%
“…The first participant is 74995799173 which uses an application called OSMO installed on a Sony SGP771 28.0.A. First the authentication [6] for 74995799173 takes place and the Façade server check with the UC server the account for this specific subscriber: When UC server finds out that the preferred device for this 74995799172 participant is 749957991721 configured on a computer, it forwards the SIP invite to this device. From this point all the signaling messages follow this path: participant 1 device ßàSBC ßàPBAXßàSBCßà participant 2 device.…”
Section: Fig 3 Mvoip Call Flowmentioning
confidence: 99%
“…Salsano et al [21] evaluated the SIP processing overhead when SIP authentication and TLS are employed. Bellovin et al analyzed the challenges in applying the Communications Assistance to Law Enforcement Act (CALEA) to wiretap VoIP calls [14].…”
Section: Related Workmentioning
confidence: 99%