Filters








32 Hits in 8.3 sec

SIP and MIPv6: Cross-Layer Mobility

Rui Prior, Susana Sargento
2007 Proceedings of the IEEE Symposium on Computers and Communications  
When jointly used, this duplication of functions leads to inefficiencies in session setup signaling, particularly if coupled with end-to-end resource reservation for the media flows.  ...  Though the MIPv6 protocol is the strongest candidate for handling mobility in next generation networks, mobility management facilities are also provided by SIP, the most widely deployed and researched  ...  Their proposal mostly intends to solve the problems associated with different types of mid-session mobility.  ... 
doi:10.1109/iscc.2007.4381552 dblp:conf/iscc/PriorS07 fatcat:t4xi4orbovgsjg4ruow3nubk5i

A SIP-based conference control framework

Petri Koskelainen, Henning Schulzrinne, Xiaotao Wu
2002 Proceedings of the 12th international workshop on Network and operating systems support for digital audio and video - NOSSDAV '02  
We identify the requirements for conference control and propose a component-based scalable conference control framework employing the Session Initiation Protocol (SIP) and the Simple Object Access Protocol  ...  The main conference control components are conference management and floor (resource) control.  ...  For dial-out, the initiator can provide the server with a list of invitees, rather than having to complete signaling exchanges with each participant individually.  ... 
doi:10.1145/507678.507679 fatcat:bebwx6ouxbcjti7yajcly6urlm

A SIP-based conference control framework

Petri Koskelainen, Henning Schulzrinne, Xiaotao Wu
2002 Proceedings of the 12th international workshop on Network and operating systems support for digital audio and video - NOSSDAV '02  
We identify the requirements for conference control and propose a component-based scalable conference control framework employing the Session Initiation Protocol (SIP) and the Simple Object Access Protocol  ...  The main conference control components are conference management and floor (resource) control.  ...  For dial-out, the initiator can provide the server with a list of invitees, rather than having to complete signaling exchanges with each participant individually.  ... 
doi:10.1145/507670.507679 dblp:conf/nossdav/KoskelainenSW02 fatcat:7kbfaplgm5ckbct5vf5lfedxfa

A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP)

Vijay K. Gurbani, Vladimir Kolesnikov
2011 IEEE Communications Surveys and Tutorials  
Exchanging cryptographic keys to encrypt the media stream in the Session Initiation Protocol (SIP) has proven difficult.  ...  In this paper, we survey three key management protocols -SDES, ZRTP and DTLS-SRTP -that have been proposed for media keying, and evaluate them for use with SIP.  ...  Bob's proxy has instructions to forward any session invitation requests to Bob's associate, Carol.  ... 
doi:10.1109/surv.2011.041010.00064 fatcat:wltlyy7rgnen3etmbq4idquvae

Algorithm for Elimination of Clipping Effects and Ghost Ringing in SIP initiated IPSec based VoIP

Jaspreet Singh, V.P. Singh, Ashish Aggrawal
2012 International Journal of Computer Applications  
Call establishment in SIP initiated IPSec deals with cryptographic processing at the caller and the recipient end.  ...  IPSec, when initiated by utilizing Offer Answer model of SIP, i.e. SIP initiate IPSec, uses less number of roundtrips with the help of Multimedia Internet Keying (MIKEY) protocol.  ...  These two problems are the byproducts of SIP initiated IPSec method.  ... 
doi:10.5120/8193-1565 fatcat:jowixyvenzhrxh2qponq6o5b6m

A secure and lightweight scheme for media keying in the session initiation protocol (SIP)

Vijay K. Gurbani, Vladimir Kolesnikov
2010 Principles, Systems and Applications of IP Telecommunications on - IPTComm '10  
Exchanging keys to encrypt media streams in the Session Initiation Protocol (SIP) has proved challenging.  ...  We then introduce a novel simple and lightweight scheme to significantly increase the security of SDES SIP keying with minimal overhead costs.  ...  INTRODUCTION The Session Initiation Protocol (SIP [17] ) is an Internet protocol to set up, maintain, and terminate multimedia sessions.  ... 
doi:10.1145/1941530.1941535 dblp:conf/iptcomm/GurbaniK10 fatcat:wndq6y5pavez5c42dwmgxll7ou

SIP-Based IMS Signaling Analysis for WiMax-3G Interworking Architectures

A. Munir, A. Gordon-Ross
2010 IEEE Transactions on Mobile Computing  
Index Terms-IP multimedia subsystem (IMS), network architecture, session initiation protocol (SIP). Ç IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 5, MAY 2010 733 . A. Munir is with the  ...  The application layer Session Initiation Protocol (SIP), standardized by 3GPP and 3GPP2 for IMS, is responsible for IMS session establishment, management, and transformation.  ...  ACKNOWLEDGMENTS The initial part of this work was supported by Bell Canada and the Natural Sciences and Engineering Research Council of Canada (NSERC) under the supervision of Dr. Vincent Wong.  ... 
doi:10.1109/tmc.2010.16 fatcat:txz64ytmbbelvefmck6gitptke

Reliable Session Initiation Protocol [chapter]

Harold Zheng, Sherry Wang
2011 VoIP Technologies  
RFC 4320: Actions Addressing Identified Issues with the Session Initiation Protocol's (SIP) Non- INVITE Transaction Describes modifications to the SIP to address problems that have been identified  ...  with the SIP non- INVITE transaction.  ...  Reliable Session Initiation Protocol, VoIP Technologies, Dr Shigeru Kashihara (Ed.), ISBN: 978-953-307-549-5, InTech, Available from: http://www.intechopen.com/books/voiptechnologies/reliable-session-initiation-protocol  ... 
doi:10.5772/14414 fatcat:vthffoxhzjf6bdj5yv77pmbvgu

Formal analysis for robust anti-SPIT protection using model checking

Dimitris Gritzalis, Panagiotis Katsaros, Stylianos Basagiannis, Yannis Soupionis
2012 International Journal of Information Security  
We propose an Anti-SPIT Policy Management mechanism (aSPM) that detects spam calls and prevents VoIP session establishment by the Session Initiation Protocol (SIP).  ...  In Section 3, we describe the methodology followed for formally analyzing robustness of anti-SPIT measures in the Session Initiation Protocol (SIP).  ...  Acknowledgements This work was performed in the framework of the SPHINX (09SYN-72-419) project, which is partly funded by the Cooperation Programme of the Hellenic General Secretariat for Research & Technology  ... 
doi:10.1007/s10207-012-0159-4 fatcat:o5stlskmdzbe3mdvjc7prn3fwe

An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols

Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills
2010 International Journal of Security and Networks (IJSN)  
The tool is designed to process file transfers using the BitTorrent peer-topeer protocol and VoIP phone calls made using the Session Initiation Protocol (SIP).  ...  The system is implemented using an FPGA-based embedded software application, and processes file transfers using the BitTorrent protocol and VoIP phone calls made using the Session Initiation Protocol (  ...  Barry Mullins, for providing the right balance of guidance to keep me on track and freedom to explore my ideas and bring them to fruition. In addition, I would also like to thank Dr.  ... 
doi:10.1504/ijsn.2010.037662 fatcat:z5urs75edbbiviqdz2nyulm5sa

Anonymity and closely related terms in the cyberspace: An analysis by example

Georgios Kambourakis
2014 Journal of Information Security and Applications  
wide-scale; that is, SIP and Kerberos ones.  ...  To support this argumentation, the paper examines as a dual case study the ways anonymity is conceptualised in the case of two well-established but dissimilar protocols employed in the cyberspace on a  ...  This time penalty is associated only to SIP signaling and it is perceived starting from the moment the caller's UA sends out an invite until an OK message is received by her.  ... 
doi:10.1016/j.jisa.2014.04.001 fatcat:f5pnlbbhabggbbicpbatgz5hce

The Parrot Is Dead: Observing Unobservable Network Communications

A. Houmansadr, C. Brubaker, V. Shmatikov
2013 2013 IEEE Symposium on Security and Privacy  
We show dozens of passive and active methods that recognize even a single imitated session, without any need to correlate multiple network flows or perform sophisticated traffic analysis.  ...  We then present our recommendations for the design of unobservable communication systems.  ...  A CensorSpoofer client initiates a SIP connection with the CensorSpoofer server by sending a SIP INVITE to the appropriate SIP ID.  ... 
doi:10.1109/sp.2013.14 dblp:conf/sp/HoumansadrBS13 fatcat:ux57wstrhnfuhmtknw3pg4uf2y

DoS attacks exploiting signaling in UMTS and IMS

Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park
2011 Computer Communications  
Our focus is on signaling-oriented attacks above the physical layer.  ...  In this paper we investigate the vulnerabilities of the UMTS security architecture that can be exploited by a malicious individual to mount Denial of Service (DoS) attacks.  ...  Thus, any unauthorized modification with a forged Re-INVITE of a dialog-session by a potential attacker may cause a DoS.  The UPDATE attack: The SIP UPDATE method provides the end-users with various capabilities  ... 
doi:10.1016/j.comcom.2010.02.010 fatcat:zqy4zdcbjvhnpbgiarcqedh624

A MIDDLEWARE-INDEPENDENT AND SECURE PEER-TO-PEER SIP ARCHITECTURE (MISE-P2PSIP) [article]

YENUKUNME PELAGIE ELYSE HOUNGUE
2012
Abstract A Middleware-Independent and SEcure Peer-to-Peer SIP architecture (MISE-P2PSIP) The Session Initiation Protocol (SIP) is the de facto standard for multimedia multiparty sessions signaling in Next  ...  Thirdly, the thesis handles the Network Address Translation (NAT) traversal problem. Whereas P2P SIP architectures come with several benefits, they inherit NAT traversal issues from SIP world.  ...  I.1 Problem statement and goals The Session Initiation Protocol (SIP) is an IETF (Internet Engineering Task Force) protocol for the establishment, modification and tearing down of multimedia sessions  ... 
doi:10.13130/houngue-yenukunme-pelagie-elyse_phd2012-03-06 fatcat:le3h4ncgy5a7xlkgzobfnmfmjq

On the Feasibility of Using 802.11p for Communication of Electronic Toll Collection Systems

Mei-Wen Li, Tsung-hsun Wu, Wei-Yen Lin, Kun-chan Lan, Chien-Ming Chou, Chung-Hsien Hsu
2011 2011 14th International Conference on Network-Based Information Systems  
In this work, we develop a protocol on top of WSMP to build a reliable session for the message exchanges between RSU and OBU.  ...  In this paper, we first describe the design of our session protocol and evaluate its performance for ETC communication in simulations.  ...  Acknowledgment This work was supported by the National Science Council of the Republic of China, Taiwan, under Grants NSC 99-2220-E-006-023 and NSC 100-2219-E-006-005.  ... 
doi:10.1109/nbis.2011.20 dblp:conf/nbis/LiWLLCH11 fatcat:wtfmcmdv65aqfpbtwfn6spch74
« Previous Showing results 1 — 15 out of 32 results