共查询到16条相似文献,搜索用时 125 毫秒
1.
2.
3.
会话初始协议(SIP)在许多领域已经开始发挥重要的作用。作为下一代互联网中的核心协议之一,SIP实体间通讯的安全性成为了至关重要的问题。通过对SIP现有的安全机制进行分析和比较,在此基础之上提出了一种新的基于自生成证书公钥加密体制(SGC-PKE)的可认证密钥协商方案,保证了SIP消息在传输过程中的完整性和机密性,并克服了使用公钥基础设施(PKI)带来的缺点。 相似文献
4.
SIP安全认证机制研究 总被引:3,自引:1,他引:2
会话发起协议(SIP)简单灵活,便于业务扩展,是使用最广泛的信令协议之一。但是它缺乏有效的安全认证机制,容易受到攻击。分析了SIP可能受到的攻击,对已有安全认证机制进行比较,并提出一种基于公钥的安全认证机制,增强了SIP域内和端到端的安全性。 相似文献
5.
SIP以其灵活的部署特性,为多媒体会话带来了便利。但由于协议本身对安全机制的考量较少,其面临的安全威胁也很多样。本文着重研究了SIP身份认证的安全方案,结合现有的公钥认证体制,提出了一种基于(2,2)秘密共享加密方案的SIP身份认证方案,实现了通信双方的双向身份认证,同时也实现了会话密钥的分发。 相似文献
6.
本文先简要概述了SIP应用背景和重要概念,然后详细分析了SIP面临的安全威胁以及现有安全解决方案,主要为安全认证和加密,讨论了几种典型方案的原理和不足.随后仔细研究了一种先进的基于共享用户密码进行密钥协商的轻量级的SIP安全认证、加密机制,并加入一次口令机制加以改进.随后借鉴了一种基于能力的IP-DOS控制思想,结合S... 相似文献
7.
陈业纲 《计算机工程与设计》2008,29(1):42-44
LDAP目录作为一种非关系型数据库,可以简化信息查询的步骤,同时PAM提供了一种用于将各种底层认证模块与上层应用无缝集成的安全机制.为了解决SIP服务器在认证过程中出现的问题,提出了 SIP 在运行过程中利用LDAP实现SIP服务器的PAM认证方案,并利用 pam_ldap 模块实现了 SIP 服务器的LDAP认证. 相似文献
8.
一种基于身份的SIP认证与密钥协商机制 总被引:1,自引:0,他引:1
随着SIP协议在网络通信中的广泛应用,特别是向移动领域扩展,网络中大量使用无线设备,终端的运算与存储能力有限。对SIP的安全方案进行了讨论和分析,提出了一种基于身份的认证与密钥协商方案,保证了SIP消息传输过程中的完整性和真实性,并在该过程中进行了密钥协商。方案中不需要公钥证书,用户用身份标识SIP URI作为公钥,降低了对终端计算、存储能力的需求和通信开销,具有简单高效的优点。 相似文献
9.
10.
SIP是应用层信令控制协议,具有简单、扩展性、扩容性好等优点;LDAP目录是特殊的数据库系统,针对读取、浏览和搜索操作进行特定优化,可简化查询步骤;PAM模块采用将底层认证模块与上层应用无缝集成的安全机制,使上层应用和底层认证独立化。基于此,提出了将LDAP与PAM结合起来实现SIP服务器的认证方案,并利用PAM LDAP模块实现了其认证。 相似文献
11.
会话初始化协议(SIP)提供了认证和协商会话密钥,能保证后续会话的安全。2010年,Yoon等(YOON E-J,YOO K-Y.A three-factor authenticated key agreement scheme for SIP on elliptic curves.NSS'10:4th International Conference on Network and System Security.Piscataway:IEEE,2010:334-339)提出一种新的三要素SIP认证密钥协商协议TAKASIP。但TAKASIP协议不能抵抗内部攻击、服务器伪装攻击、离线口令猜测攻击、身份冒充攻击和丢失标记攻击,并且没有提供双向认证。在TAKASIP协议基础上提出一种基于椭圆曲线密码三要素SIP认证协议ETAKASIP以解决上述问题。ETAKASIP基于椭圆曲线离散对数难题和椭圆曲线密码系统,提供了高安全性。该协议只需7次椭圆曲线点乘运算、1次椭圆曲线加法运算和最高6次哈希运算,有较高的运算效率。 相似文献
12.
13.
Session Initiation Protocol (SIP) has been widely used in the current Internet protocols such as Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). However, the original SIP authentication scheme was insecure and many researchers tried to propose schemes to overcome the flaws. In the year 2011, Arshad et al. proposed a SIP authentication protocol using elliptic curve cryptography (ECC), but their scheme suffered from off-line password guessing attack along with password change pitfalls. To conquer the mentioned weakness, we proposed an ECC-based authentication scheme for SIP. Our scheme only needs to compute four elliptic curve scale multiplications and two hash-to-point operations, and maintains high efficiency. The analysis of security of the ECC-based protocol shows that our scheme is suitable for the applications with higher security requirement. 相似文献
14.
Yanrong Lu Lixiang Li Haipeng Peng Yixian Yang 《Peer-to-Peer Networking and Applications》2016,9(2):449-459
The Session Initiation Protocol (SIP) as the core signaling protocol for multimedia services is receiving much attention. Authentication is becoming increasingly crucial issue when a user asks to use SIP services. Many authentication schemes for the SIP have been proposed. Very recently, Zhang et al. has presented an authentication scheme for SIP and claimed their scheme could overcome various attacks while maintaining efficiency. In this research, we illustrate that their scheme is susceptible to the insider attack and does not provide proper mutual authentication. We then propose a modified secure mutual authentication scheme to conquer the security flaws in Zhang et al.’s scheme. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Zhang et al.’s scheme. In addition, the performance analysis shows that our scheme has better efficiency in comparison with other related ECC-based authentication schemes for SIP. 相似文献
15.
针对基于会话初始协议(SIP)的IP多媒体子系统(IMS)网络安全机制,分析了SIP协议存在的安全隐患,将身份密钥协商协议IBAKA和头域敏感信息完整性保护等机制有效结合,提出了基于身份密码的轻量级SIP安全方案。分析了该方案的安全性,并从安全性和抗攻击性方面与几种典型方案进行比较。比较结果表明,该方案克服了SIP协议的安全隐患,提高了协议的安全性。 相似文献
16.
The Session Initiation Protocol (SIP) is commonly used to establish Voice over IP (VoIP) calls. However, the original authentication scheme for SIP-based service typically uses HTTP Digest authentication protocol, which is s not providing security at an acceptable level. In this paper, we propose a secure and practical password-only authenticated key agreement scheme for SIP using elliptic curve cryptography(ECC). Our scheme is remarkable efficient and quite simple to use. And yet we can provide the rigorous proof of the security for it. Therefore, the end result is more suited to be a candidate for SIP authentication scheme. In addition, we also suggest an extended scheme capable of providing anonymity, privacy, and location privacy to protect the user’s personal information and his real identity. 相似文献