Abstract
In the last decade, Session Initiation Protocol (SIP) is the most popular application layer protocol created in order to manage multimedia sessions over IP protocol. SIP is not used only by telephony over IP (ToIP), but it can be used also by other in line application such as instant message, video conferences, and others. Since SIP inherits the security threats of IP which are added to SIP owner problems, the security of SIP services must be enhanced. Recently, we have designed a new SIP authentication protocol. Then, we have proved theoretically that our protocol is secured against various attacks. In this paper, we use the API JAIN SIP to implement our protocol. Therefore, we have tested developed applications in local area network. The obtained results confirm that our proposed protocol is efficient when it is compared with some implemented protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E: SIP: session initiation protocol. No. RFC 3261 (2002)
Thom, G.A.: H. 323: the multimedia communications standard for local area networks. IEEE Commun. Mag. 34(12), 52–56 (1996)
Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., Stewart, L.: HTTP authentication: basic and digest access Authentication, June 1999
Arshad, H., Nikooghadam, M.: An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimedia Tools Appl. 75(1), 181–197 (2016)
Lin, H., Wen, F., Du, C.: An anonymous and secure authentication and key agreement scheme for session initiation protocol. Multimedia Tools and Appl. 76(2), 2315–2329 (2017)
Farash, M.: Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Appl. 9, 1–10 (2014). https://doi.org/10.1007/s12083-014-0315-x
Azrour, M., Farhaoui, Y., Ouanan, M.: Weakness in Zhang et al.’s authentication protocol for session initiation protocol. In: Ezziyyani, M., Bahaj, M., Khoukhi, F. (eds.) AIT2S 2017. LNNS, vol. 25, pp. 239–251. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-69137-4_22
Arshad, H., Nikooghadam, M.: An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimed Tools Appl. (2014). https://doi.org/10.1007/s11042-014-2282-x
Zhu, W., Chen, J., He, D.: Enhanced authentication protocol for session initiation protocol using smart card. Int. J. Electron. Secur. Digit. Forensics 7(4), 330–342 (2015)
Chaudhry, S.A., Mahmood, K., Naqvi, H., Sher, M.: A secure authentication scheme for session initiation protocol based on elliptic curve cryptography. In: 2015 IEEE International Conference on Computer and Information Technology, Ubiquitous Computing and Communications. Dependable, Autonomic and Secure Computing, Pervasive Intelligence and Computing (2015)
Kumari, S., Chaudhry, A., Wu, F., Li., X., Farash, M.S., Khan, M.K.: An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. (2015)
Wu, K., Gong, P., Wang, J., Yan, X., Li, P.: An improved authentication protocol for session initiation protocol using smart card and elliptic curve cryptography. Rom. J. Inf. Sci. Technol. 16(4), 324–335 (2013)
Azrour, M., Ouanan, M., Farhaoui, Y.: SIP authentication protocols based on elliptic curve cryptography: survey and comparison. Indonesian J. Electric. Eng. Comput. Sci. 4(1), 231–239 (2016)
Azrour, M., Farhaoui, Y., Ouanan, M.: A server spoofing attack on Zhang et al. SIP authentication protocol. Int. J. Tomogr. Simul. 30(3), 47–58 (2017)
Azrour, M., Farhaoui, Y., Ouanan, M.: Cryptanalysis of Farash et al.’s SIP authentication protocol. Int. J. Dyn. Syst. Differ. Equ. 8(1–2), 77–94 (2018)
Azrour, M., Ouanan, M., Farhaoui, Y., Guezzaz, A.: Security analysis of Ye et al. authentication protocol for internet of things. In: Farhaoui, Y., Moussaid, L. (eds.) ICBDSDE 2018. SBD, vol. 53, pp. 67–74. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12048-1_9
Azrour, M., Ouanan, M., Farhaoui, Y.: A new efficient SIP authentication and key agreement protocol based on chaotic maps and using smart card. In: Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, p. 70. ACM, November 2017
Azrour, M., Ouanan, M., Farhaoui, Y.: Survey of SIP malformed messages detection. Indonesian J. Electric. Eng. Comput. Sci. 7(2), 457–465 (2017)
Tsiatsikas, Z., Kambourakis, G., Geneiatakis, D., Wang, H.: The devil is in the detail: sdp-driven malformed message attacks and mitigation in sip ecosystems. IEEE Access 7, 2401–2417 (2019)
Azrour, M., Ouanan, M., Farhaoui, Y.: A new architecture to protect sip server against flooding attack. Int. J. Tomogr. Simul. 31(3), 15–28 (2018)
Dassouki, K., Safa, H., Hijazi, A., El-Hajj, W.: A SIP delayed based mechanism for detecting VOIP flooding attacks. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 588–593. IEEE. (2016)
Azrour, M., Farhaoui, Y., Ouanan, M., Guezzaz, A.: SPIT detection in telephony over ip using k-means algorithm. Procedia Comput. Sci. 148, 542–551 (2019)
Chikha, R.J.B., Abbes, T., Chikha, W.B., Bouhoula, A.: Behavior-based approach to detect spam over IP telephony attacks. Int. J. Inf. Secur. 2(15), 131–143 (2016)
Azrour, M., Farhaoui, Y., Ouanan, M.: A new secure authentication and key exchange protocol for session initiation protocol using smart card. Int. J. Network Secur. 195(6), 870–879 (2017). https://doi.org/10.6633/IJNS.201711.19(6).02
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Azrour, M., Farhaoui, Y., Guezzaz, A. (2020). Experimental Validation of New SIP Authentication Protocol. In: Farhaoui, Y. (eds) Big Data and Networks Technologies. BDNT 2019. Lecture Notes in Networks and Systems, vol 81. Springer, Cham. https://doi.org/10.1007/978-3-030-23672-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-23672-4_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23671-7
Online ISBN: 978-3-030-23672-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)