Presentation is loading. Please wait.

Presentation is loading. Please wait.

Session Initiation Protocol (SIP) 496530018 王承宇 498410098 張永霖.

Similar presentations


Presentation on theme: "Session Initiation Protocol (SIP) 496530018 王承宇 498410098 張永霖."— Presentation transcript:

1 Session Initiation Protocol (SIP) 496530018 王承宇 498410098 張永霖

2 Session Initiation Protocol (SIP) The Session Initiation Protocol (SIP) is a text-based signaling protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol networks such as Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). Session Initiation Protocol(SIP) (HTTP)Hyper Text Transport Protocol (SMTP)Simple Mail Transport Protocol

3 The original SIP authentication scheme based on HTTP digest authentication is vulnerable to some attack: Off-line password guessing attacks Server spoofing attacks Denning-Sacco attacks Stolen-verifier attacks Then, a new SIP authentication scheme was proposed in a converged VoIP network based on ECC in order to overcome those security problems.

4 SIP architecture SIP is a call setup signaling protocol for IP-based telephony services. The SIP architecture is mainly composed of a user agent client, proxy server, redirect server, register server, and location server. The function of each component is described as follows. Proxy server Redirect server Register server Location serve

5 SIP authentication procedure SIP authentication security is based on the challenge– response mechanism. Before the authentication procedure starts, the client pre-shares a password with the server. The pre-shared password is used to verify the identity of the client or the server. The protocol proceeds as follows.

6 SIP authentication procedure(cont) (1) Client ? Server: REQUEST The client sends a REQUEST to the server. (2) Server ? Client: CHALLENGE (nonce, realm) The server generates a CHALLENGE that includes a nonce and the client’s realm. It is noted that the realm is used to prompt the username and password. Then the server sends a CHALLENGE back. (3) Client ? Server: RESPONSE (nonce, realm, username,response) The client computes a response = F(nonce, realm, username, response). Note that FðÞ is a one-way hash function and is used to generate a digest authentication message. Then the client sends the RESPONSE to the server. (4) According to the username, the server extracts the client’s password. Then the server verifies whether or not the nonce is correct. If it is correct, the server computes h(nonce, realm, username, response) and uses it to make a comparison with the response. If they match, the server authenticates the identity of the client.

7 Security analysis With the above definitions, the following theorems are used to analyze the security properties in the proposed SIP uthentication scheme. Replay attacks Password guessing attacks Man-in-the-middle attacks Modification attacks Denning-Sacco attacks Stolen-Verifier attacks Mutual authentication Known-key security Session key security Perfect forward secrecy

8 Conclusions In order to resolve those security problems, a new secure and efficient SIP authentication scheme for converged VoIP networks based on elliptic curve cryptosystem (ECC) has been proposed. It has been demonstrated that the proposed SIP authentication scheme resists against those at tacks through exploiting the key block size, speed, and security jointly.


Download ppt "Session Initiation Protocol (SIP) 496530018 王承宇 498410098 張永霖."

Similar presentations


Ads by Google