Analysis and its solution on security threats in SIP-based mobility support environments

SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP secur...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Jea-Tek Ryu, Byeong-hee Roh, Man-Pyo Hong, Hwan-Kuk Kim, Jeong-Wook Kim
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 607
container_issue
container_start_page 603
container_title
container_volume
creator Jea-Tek Ryu
Byeong-hee Roh
Man-Pyo Hong
Hwan-Kuk Kim
Jeong-Wook Kim
description SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP security threats have been conducted, studies regarding security threats under a SIP application-level mobility supported environment are relatively fewer in number. The aim of this paper is to analyze security threats under a mobile SIP environment. Moreover we argue that our suggested approach, through an extended application of the SIP INFO method, handles SIP mobility threats effectively without additional functions or systems.
doi_str_mv 10.1109/INNOVATIONS.2008.4781767
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4781767</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4781767</ieee_id><sourcerecordid>4781767</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-bf20e1baccce306715d56d6b671ebf21f98ae430943b94e2899cb431242d64023</originalsourceid><addsrcrecordid>eNo1kM1qwzAQhFVKoE3qJ-hFL2BXf5GsYwj9MQS7EFN6C5K9oSqObCy5kLevQ9NhYWb5lj0MQpiSjFKin4qyrD42dVGV-4wRkmdC5VRJdYMSPSfBhOBcK3qLlv-LVAu0vNxqShiVdygJ4ZvMEmvOlbpHnxtvunNwARvfYhcDDn03Rdd7PE-AZhpdPOP4NYKZofN4X7yn1gRo8am3rrvQMA1DP0YM_seNvT-Bj-EBLY6mC5BcfYXql-d6-5buqtdiu9mlTpOY2iMjQK1pmgY4kYqu27VspZ0TzIwedW5AcKIFt1oAy7VurOCUCdZKQRhfoce_tw4ADsPoTmY8H67F8F_HhVfc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Analysis and its solution on security threats in SIP-based mobility support environments</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Jea-Tek Ryu ; Byeong-hee Roh ; Man-Pyo Hong ; Hwan-Kuk Kim ; Jeong-Wook Kim</creator><creatorcontrib>Jea-Tek Ryu ; Byeong-hee Roh ; Man-Pyo Hong ; Hwan-Kuk Kim ; Jeong-Wook Kim</creatorcontrib><description>SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP security threats have been conducted, studies regarding security threats under a SIP application-level mobility supported environment are relatively fewer in number. The aim of this paper is to analyze security threats under a mobile SIP environment. Moreover we argue that our suggested approach, through an extended application of the SIP INFO method, handles SIP mobility threats effectively without additional functions or systems.</description><identifier>ISBN: 1424433967</identifier><identifier>ISBN: 9781424433964</identifier><identifier>EISBN: 9781424433971</identifier><identifier>EISBN: 1424433975</identifier><identifier>DOI: 10.1109/INNOVATIONS.2008.4781767</identifier><identifier>LCCN: 2008910216</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system security ; Communications technology ; Information analysis ; Information security ; Internet ; IP networks ; Network servers ; Routing ; Virtual reality ; Web server</subject><ispartof>2008 International Conference on Innovations in Information Technology, 2008, p.603-607</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4781767$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4781767$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Jea-Tek Ryu</creatorcontrib><creatorcontrib>Byeong-hee Roh</creatorcontrib><creatorcontrib>Man-Pyo Hong</creatorcontrib><creatorcontrib>Hwan-Kuk Kim</creatorcontrib><creatorcontrib>Jeong-Wook Kim</creatorcontrib><title>Analysis and its solution on security threats in SIP-based mobility support environments</title><title>2008 International Conference on Innovations in Information Technology</title><addtitle>INNOVATIONS</addtitle><description>SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP security threats have been conducted, studies regarding security threats under a SIP application-level mobility supported environment are relatively fewer in number. The aim of this paper is to analyze security threats under a mobile SIP environment. Moreover we argue that our suggested approach, through an extended application of the SIP INFO method, handles SIP mobility threats effectively without additional functions or systems.</description><subject>Communication system security</subject><subject>Communications technology</subject><subject>Information analysis</subject><subject>Information security</subject><subject>Internet</subject><subject>IP networks</subject><subject>Network servers</subject><subject>Routing</subject><subject>Virtual reality</subject><subject>Web server</subject><isbn>1424433967</isbn><isbn>9781424433964</isbn><isbn>9781424433971</isbn><isbn>1424433975</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kM1qwzAQhFVKoE3qJ-hFL2BXf5GsYwj9MQS7EFN6C5K9oSqObCy5kLevQ9NhYWb5lj0MQpiSjFKin4qyrD42dVGV-4wRkmdC5VRJdYMSPSfBhOBcK3qLlv-LVAu0vNxqShiVdygJ4ZvMEmvOlbpHnxtvunNwARvfYhcDDn03Rdd7PE-AZhpdPOP4NYKZofN4X7yn1gRo8am3rrvQMA1DP0YM_seNvT-Bj-EBLY6mC5BcfYXql-d6-5buqtdiu9mlTpOY2iMjQK1pmgY4kYqu27VspZ0TzIwedW5AcKIFt1oAy7VurOCUCdZKQRhfoce_tw4ADsPoTmY8H67F8F_HhVfc</recordid><startdate>200812</startdate><enddate>200812</enddate><creator>Jea-Tek Ryu</creator><creator>Byeong-hee Roh</creator><creator>Man-Pyo Hong</creator><creator>Hwan-Kuk Kim</creator><creator>Jeong-Wook Kim</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200812</creationdate><title>Analysis and its solution on security threats in SIP-based mobility support environments</title><author>Jea-Tek Ryu ; Byeong-hee Roh ; Man-Pyo Hong ; Hwan-Kuk Kim ; Jeong-Wook Kim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-bf20e1baccce306715d56d6b671ebf21f98ae430943b94e2899cb431242d64023</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Communication system security</topic><topic>Communications technology</topic><topic>Information analysis</topic><topic>Information security</topic><topic>Internet</topic><topic>IP networks</topic><topic>Network servers</topic><topic>Routing</topic><topic>Virtual reality</topic><topic>Web server</topic><toplevel>online_resources</toplevel><creatorcontrib>Jea-Tek Ryu</creatorcontrib><creatorcontrib>Byeong-hee Roh</creatorcontrib><creatorcontrib>Man-Pyo Hong</creatorcontrib><creatorcontrib>Hwan-Kuk Kim</creatorcontrib><creatorcontrib>Jeong-Wook Kim</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jea-Tek Ryu</au><au>Byeong-hee Roh</au><au>Man-Pyo Hong</au><au>Hwan-Kuk Kim</au><au>Jeong-Wook Kim</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Analysis and its solution on security threats in SIP-based mobility support environments</atitle><btitle>2008 International Conference on Innovations in Information Technology</btitle><stitle>INNOVATIONS</stitle><date>2008-12</date><risdate>2008</risdate><spage>603</spage><epage>607</epage><pages>603-607</pages><isbn>1424433967</isbn><isbn>9781424433964</isbn><eisbn>9781424433971</eisbn><eisbn>1424433975</eisbn><abstract>SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP security threats have been conducted, studies regarding security threats under a SIP application-level mobility supported environment are relatively fewer in number. The aim of this paper is to analyze security threats under a mobile SIP environment. Moreover we argue that our suggested approach, through an extended application of the SIP INFO method, handles SIP mobility threats effectively without additional functions or systems.</abstract><pub>IEEE</pub><doi>10.1109/INNOVATIONS.2008.4781767</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1424433967
ispartof 2008 International Conference on Innovations in Information Technology, 2008, p.603-607
issn
language eng
recordid cdi_ieee_primary_4781767
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Communication system security
Communications technology
Information analysis
Information security
Internet
IP networks
Network servers
Routing
Virtual reality
Web server
title Analysis and its solution on security threats in SIP-based mobility support environments
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T15%3A19%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Analysis%20and%20its%20solution%20on%20security%20threats%20in%20SIP-based%20mobility%20support%20environments&rft.btitle=2008%20International%20Conference%20on%20Innovations%20in%20Information%20Technology&rft.au=Jea-Tek%20Ryu&rft.date=2008-12&rft.spage=603&rft.epage=607&rft.pages=603-607&rft.isbn=1424433967&rft.isbn_list=9781424433964&rft_id=info:doi/10.1109/INNOVATIONS.2008.4781767&rft_dat=%3Cieee_6IE%3E4781767%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424433971&rft.eisbn_list=1424433975&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4781767&rfr_iscdi=true