9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)
DOI: 10.1109/apcc.2003.1274257
|View full text |Cite
|
Sign up to set email alerts
|

SIP signaling security for end-to-end communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…End-to-end security in application layer encryption is offered at the application layer by encryption programs in systems configured as sever and workstations configured as clients. Near the source as allowable is the encryption process, and as nearby as possible to the destination decryption will occur [1,2]. We also discovered from Glissa & Meddeb, (2019) [1], that when you merge end-toend with link layer encryption, it builds an efficient way to offer network protection.…”
Section: Application Layer Encryptionmentioning
confidence: 98%
See 1 more Smart Citation
“…End-to-end security in application layer encryption is offered at the application layer by encryption programs in systems configured as sever and workstations configured as clients. Near the source as allowable is the encryption process, and as nearby as possible to the destination decryption will occur [1,2]. We also discovered from Glissa & Meddeb, (2019) [1], that when you merge end-toend with link layer encryption, it builds an efficient way to offer network protection.…”
Section: Application Layer Encryptionmentioning
confidence: 98%
“…The more these communication methods are being used in companies or for remote control; the more critical the security services become. Equipment such as network servers may support users with a compact pack to ensure end-to-end communication [2]. The need for protection is not recent in communication networks.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, the caller ID in SIP has the form sip:callerID@ip_address and is typically encapsulated in SIP packets in plaintext. Although secured SIP is available to encrypt caller IDs, they are not authenticated [18]. Similar to SIP, caller ID is also transmitted in plaintext in H.323 during the call setup.…”
Section: Protocolsmentioning
confidence: 99%
“…Johan Bilien has recommended solutions to secure VoIP using S/MIME, TLS and MIKEY for SIP signaling to provide end-to-end authentication and session key distribution, using SRTP on payload to protect voice media [10] [11]. NTT Network Service Systems Laboratories has proposed two approaches to provide security on both SIP signaling and media streams for end-to-end communication in different scenarios [12]. In the following section, we propose our enhanced view of authentication in VoIP.…”
Section: Comparative Analysis Of Existing Authentication Schemesmentioning
confidence: 99%