Filters








26 Hits in 9.8 sec

A SIP-based conference control framework

Petri Koskelainen, Henning Schulzrinne, Xiaotao Wu
2002 Proceedings of the 12th international workshop on Network and operating systems support for digital audio and video - NOSSDAV '02  
We identify the requirements for conference control and propose a component-based scalable conference control framework employing the Session Initiation Protocol (SIP) and the Simple Object Access Protocol  ...  The main conference control components are conference management and floor (resource) control.  ...  For dial-out, the initiator can provide the server with a list of invitees, rather than having to complete signaling exchanges with each participant individually.  ... 
doi:10.1145/507678.507679 fatcat:bebwx6ouxbcjti7yajcly6urlm

A SIP-based conference control framework

Petri Koskelainen, Henning Schulzrinne, Xiaotao Wu
2002 Proceedings of the 12th international workshop on Network and operating systems support for digital audio and video - NOSSDAV '02  
We identify the requirements for conference control and propose a component-based scalable conference control framework employing the Session Initiation Protocol (SIP) and the Simple Object Access Protocol  ...  The main conference control components are conference management and floor (resource) control.  ...  For dial-out, the initiator can provide the server with a list of invitees, rather than having to complete signaling exchanges with each participant individually.  ... 
doi:10.1145/507670.507679 dblp:conf/nossdav/KoskelainenSW02 fatcat:7kbfaplgm5ckbct5vf5lfedxfa

A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP)

Vijay K. Gurbani, Vladimir Kolesnikov
2011 IEEE Communications Surveys and Tutorials  
Exchanging cryptographic keys to encrypt the media stream in the Session Initiation Protocol (SIP) has proven difficult.  ...  In this paper, we survey three key management protocols -SDES, ZRTP and DTLS-SRTP -that have been proposed for media keying, and evaluate them for use with SIP.  ...  UASes typically register themselves with a registrar, which binds their current IP address to an email-like identifier used to identify the user.  ... 
doi:10.1109/surv.2011.041010.00064 fatcat:wltlyy7rgnen3etmbq4idquvae

SIP-Based IMS Signaling Analysis for WiMax-3G Interworking Architectures

A. Munir, A. Gordon-Ross
2010 IEEE Transactions on Mobile Computing  
Index Terms-IP multimedia subsystem (IMS), network architecture, session initiation protocol (SIP). Ç IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 5, MAY 2010 733 . A. Munir is with the  ...  The application layer Session Initiation Protocol (SIP), standardized by 3GPP and 3GPP2 for IMS, is responsible for IMS session establishment, management, and transformation.  ...  ACKNOWLEDGMENTS The initial part of this work was supported by Bell Canada and the Natural Sciences and Engineering Research Council of Canada (NSERC) under the supervision of Dr. Vincent Wong.  ... 
doi:10.1109/tmc.2010.16 fatcat:txz64ytmbbelvefmck6gitptke

A secure and lightweight scheme for media keying in the session initiation protocol (SIP)

Vijay K. Gurbani, Vladimir Kolesnikov
2010 Principles, Systems and Applications of IP Telecommunications on - IPTComm '10  
Exchanging keys to encrypt media streams in the Session Initiation Protocol (SIP) has proved challenging.  ...  We then introduce a novel simple and lightweight scheme to significantly increase the security of SDES SIP keying with minimal overhead costs.  ...  INTRODUCTION The Session Initiation Protocol (SIP [17] ) is an Internet protocol to set up, maintain, and terminate multimedia sessions.  ... 
doi:10.1145/1941530.1941535 dblp:conf/iptcomm/GurbaniK10 fatcat:wndq6y5pavez5c42dwmgxll7ou

Reliable Session Initiation Protocol [chapter]

Harold Zheng, Sherry Wang
2011 VoIP Technologies  
RFC 4320: Actions Addressing Identified Issues with the Session Initiation Protocol's (SIP) Non- INVITE Transaction Describes modifications to the SIP to address problems that have been identified  ...  with the SIP non- INVITE transaction.  ...  This book introduces research strategies that address various issues with the aim of enhancing VoIP quality.  ... 
doi:10.5772/14414 fatcat:vthffoxhzjf6bdj5yv77pmbvgu

Model-Checking DoS Amplification for VoIP Session Initiation [chapter]

Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer
2009 Lecture Notes in Computer Science  
Such threats have emerged for important applications such as the VoIP Session Initiation Protocol (SIP).  ...  We illustrate the effectiveness of this technique with a study of SIP.  ...  Here, the client initiating the protocol, i.e., the UAC corresponding to alice@abc.com, sends a SIP Invite message addressed to Bob's logical SIP address bob@xyz.com (Step 1).  ... 
doi:10.1007/978-3-642-04444-1_24 fatcat:kv3xf4buxnhirhh4li2cvdbkt4

Anonymity and closely related terms in the cyberspace: An analysis by example

Georgios Kambourakis
2014 Journal of Information Security and Applications  
wide-scale; that is, SIP and Kerberos ones.  ...  To support this argumentation, the paper examines as a dual case study the ways anonymity is conceptualised in the case of two well-established but dissimilar protocols employed in the cyberspace on a  ...  such as Session Initiation Protocol (SIP) (Rosenberg et al., 2002) and Kerberos (Neuman et al., 2005; MIT-Kerberos-Consortium, 2014) ones.  ... 
doi:10.1016/j.jisa.2014.04.001 fatcat:f5pnlbbhabggbbicpbatgz5hce

An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols

Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills
2010 International Journal of Security and Networks (IJSN)  
The tool is designed to process file transfers using the BitTorrent peer-topeer protocol and VoIP phone calls made using the Session Initiation Protocol (SIP).  ...  The system is implemented using an FPGA-based embedded software application, and processes file transfers using the BitTorrent protocol and VoIP phone calls made using the Session Initiation Protocol (  ...  Barry Mullins, for providing the right balance of guidance to keep me on track and freedom to explore my ideas and bring them to fruition. In addition, I would also like to thank Dr.  ... 
doi:10.1504/ijsn.2010.037662 fatcat:z5urs75edbbiviqdz2nyulm5sa

DoS attacks exploiting signaling in UMTS and IMS

Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park
2011 Computer Communications  
Our focus is on signaling-oriented attacks above the physical layer.  ...  In this paper we investigate the vulnerabilities of the UMTS security architecture that can be exploited by a malicious individual to mount Denial of Service (DoS) attacks.  ...  So, similar to the RE-INVITE attack, an attacker may send a forged UPDATE message in order to modify the initial session parameters to cause a DoS change of parameters like QoS or initial addresses and  ... 
doi:10.1016/j.comcom.2010.02.010 fatcat:zqy4zdcbjvhnpbgiarcqedh624

A MIDDLEWARE-INDEPENDENT AND SECURE PEER-TO-PEER SIP ARCHITECTURE (MISE-P2PSIP) [article]

YENUKUNME PELAGIE ELYSE HOUNGUE
2012
Thirdly, the thesis handles the Network Address Translation (NAT) traversal problem. Whereas P2P SIP architectures come with several benefits, they inherit NAT traversal issues from SIP world.  ...  Abstract A Middleware-Independent and SEcure Peer-to-Peer SIP architecture (MISE-P2PSIP) The Session Initiation Protocol (SIP) is the de facto standard for multimedia multiparty sessions signaling in Next  ...  It also gives the SIP address of the receiving endpoint (sip:13@10.10.1.13) and identifies the version of the protocol (SIP/2.0). • Call-ID: This is a unique identifier of a given SIP session.  ... 
doi:10.13130/houngue-yenukunme-pelagie-elyse_phd2012-03-06 fatcat:le3h4ncgy5a7xlkgzobfnmfmjq

Misuse patterns in VoIP

Juan C. Pelaez, Eduardo B. Fernandez, Maria M. Larrondo-Petrie
2009 Security and Communication Networks  
Attack patterns describe from the point of view of the attacker, how a type of attack is performed (what system units it uses and how), analyzes the ways of stopping the attack by enumerating possible  ...  In a previous paper we presented the concept of misuse patterns.  ...  With tcpdump, hackers can identify the IP and MAC addresses of the phone to be attacked By using an Address Resolution Protocol (ARP) spoofing tool, the attacker could impersonate the local gateway and  ... 
doi:10.1002/sec.105 fatcat:dmbtw2t6kvhnpiye5h4nyj7mry

Misuse patterns in VoIP

Juan C. Pelaez, Eduardo B. Fernandez, M. M. Larrondo-Petrie, Christian Wieser
2007 Proceedings of the 14th Conference on Pattern Languages of Programs - PLOP '07  
Attack patterns describe from the point of view of the attacker, how a type of attack is performed (what system units it uses and how), analyzes the ways of stopping the attack by enumerating possible  ...  In a previous paper we presented the concept of misuse patterns.  ...  With tcpdump, hackers can identify the IP and MAC addresses of the phone to be attacked By using an Address Resolution Protocol (ARP) spoofing tool, the attacker could impersonate the local gateway and  ... 
doi:10.1145/1772070.1772072 fatcat:cqfn4n6nw5c7nevdsn6xoyqfle

Proceedings from the 12th Annual Conference on the Science of Dissemination and Implementation

2020 Implementation Science  
Our conference program began with a phenomenal keynote address by Dr.  ...  Each plenary panel enabled active dialogue between presenters and with the audience, further deepening the discussion and surfacing many of the nuances and issues in D&I science.  ...  Identifying and creating collaborative system-based approaches to address these issues has potential for generalizability in rural communities.  ... 
doi:10.1186/s13012-020-00985-1 pmid:32384899 fatcat:set54khjcbgfjcull3oy5xv7hi

Seamless mobility across next generation heterogeneous network

Deepti Dutt, Université D'Ottawa / University Of Ottawa, Université D'Ottawa / University Of Ottawa
2013
This dissertation addresses the issues of seamless mobility across heterogeneous network and has successfully presented a model to support mobility across homogeneous and heterogeneous environments by  ...  integrating two major mobility protocols (MIP and SIP).  ...  Session Initiation Protocol Call Flow • A call is initiated when the UAC sends an INVITE message to Amy's SIP address: amy@xyz.com.  ... 
doi:10.20381/ruor-19274 fatcat:h2rb22si3zgulchob4uoapxmsi
« Previous Showing results 1 — 15 out of 26 results