2010
DOI: 10.17487/rfc5767
|View full text |Cite
|
Sign up to set email alerts
|

User-Agent-Driven Privacy Mechanism for SIP

Abstract: This document defines a guideline for a User Agent (UA) to generate an anonymous Session Initiation Protocol (SIP) message by utilizing mechanisms such as Globally Routable User Agent URIs (GRUUs) and Traversal Using Relays around NAT (TURN) without the need for a privacy service defined in RFC 3323. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Force (IETF). It represen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Anonymous GRUUs [RFC5767] are constructed analogously, but require either that the enrollment server issues a different Node-ID for each anonymous GRUU required, or that a destination list be used that includes a Peer that compresses the destination list to stop the Node-ID from being revealed.…”
Section: Using Gruusmentioning
confidence: 99%
“…Anonymous GRUUs [RFC5767] are constructed analogously, but require either that the enrollment server issues a different Node-ID for each anonymous GRUU required, or that a destination list be used that includes a Peer that compresses the destination list to stop the Node-ID from being revealed.…”
Section: Using Gruusmentioning
confidence: 99%
“…Finally, implementation and evaluation has not yet been done. [29] RFC 5767 [29] discussed a framework to conceal users' real identity based on Globally Routable User Agent URIs (GRUU) and Traversal Using Relays around NAT (TURN). GRUU [37] works as a temporary globally unique identifier for a specific UA instance.…”
Section: User-provided and Network-provided Pseudonymsmentioning
confidence: 99%
“…One of the ways is the UA-driven privacy mechanism [8], where the UA can facilitate the concealment of topology information.…”
Section: General Information and Requirementsmentioning
confidence: 99%