Analysis and its solution on security threats in SIP-based mobility support environments
SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP secur...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 607 |
---|---|
container_issue | |
container_start_page | 603 |
container_title | |
container_volume | |
creator | Jea-Tek Ryu Byeong-hee Roh Man-Pyo Hong Hwan-Kuk Kim Jeong-Wook Kim |
description | SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP security threats have been conducted, studies regarding security threats under a SIP application-level mobility supported environment are relatively fewer in number. The aim of this paper is to analyze security threats under a mobile SIP environment. Moreover we argue that our suggested approach, through an extended application of the SIP INFO method, handles SIP mobility threats effectively without additional functions or systems. |
doi_str_mv | 10.1109/INNOVATIONS.2008.4781767 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4781767</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4781767</ieee_id><sourcerecordid>4781767</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-bf20e1baccce306715d56d6b671ebf21f98ae430943b94e2899cb431242d64023</originalsourceid><addsrcrecordid>eNo1kM1qwzAQhFVKoE3qJ-hFL2BXf5GsYwj9MQS7EFN6C5K9oSqObCy5kLevQ9NhYWb5lj0MQpiSjFKin4qyrD42dVGV-4wRkmdC5VRJdYMSPSfBhOBcK3qLlv-LVAu0vNxqShiVdygJ4ZvMEmvOlbpHnxtvunNwARvfYhcDDn03Rdd7PE-AZhpdPOP4NYKZofN4X7yn1gRo8am3rrvQMA1DP0YM_seNvT-Bj-EBLY6mC5BcfYXql-d6-5buqtdiu9mlTpOY2iMjQK1pmgY4kYqu27VspZ0TzIwedW5AcKIFt1oAy7VurOCUCdZKQRhfoce_tw4ADsPoTmY8H67F8F_HhVfc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Analysis and its solution on security threats in SIP-based mobility support environments</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Jea-Tek Ryu ; Byeong-hee Roh ; Man-Pyo Hong ; Hwan-Kuk Kim ; Jeong-Wook Kim</creator><creatorcontrib>Jea-Tek Ryu ; Byeong-hee Roh ; Man-Pyo Hong ; Hwan-Kuk Kim ; Jeong-Wook Kim</creatorcontrib><description>SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP security threats have been conducted, studies regarding security threats under a SIP application-level mobility supported environment are relatively fewer in number. The aim of this paper is to analyze security threats under a mobile SIP environment. Moreover we argue that our suggested approach, through an extended application of the SIP INFO method, handles SIP mobility threats effectively without additional functions or systems.</description><identifier>ISBN: 1424433967</identifier><identifier>ISBN: 9781424433964</identifier><identifier>EISBN: 9781424433971</identifier><identifier>EISBN: 1424433975</identifier><identifier>DOI: 10.1109/INNOVATIONS.2008.4781767</identifier><identifier>LCCN: 2008910216</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system security ; Communications technology ; Information analysis ; Information security ; Internet ; IP networks ; Network servers ; Routing ; Virtual reality ; Web server</subject><ispartof>2008 International Conference on Innovations in Information Technology, 2008, p.603-607</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4781767$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4781767$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Jea-Tek Ryu</creatorcontrib><creatorcontrib>Byeong-hee Roh</creatorcontrib><creatorcontrib>Man-Pyo Hong</creatorcontrib><creatorcontrib>Hwan-Kuk Kim</creatorcontrib><creatorcontrib>Jeong-Wook Kim</creatorcontrib><title>Analysis and its solution on security threats in SIP-based mobility support environments</title><title>2008 International Conference on Innovations in Information Technology</title><addtitle>INNOVATIONS</addtitle><description>SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP security threats have been conducted, studies regarding security threats under a SIP application-level mobility supported environment are relatively fewer in number. The aim of this paper is to analyze security threats under a mobile SIP environment. Moreover we argue that our suggested approach, through an extended application of the SIP INFO method, handles SIP mobility threats effectively without additional functions or systems.</description><subject>Communication system security</subject><subject>Communications technology</subject><subject>Information analysis</subject><subject>Information security</subject><subject>Internet</subject><subject>IP networks</subject><subject>Network servers</subject><subject>Routing</subject><subject>Virtual reality</subject><subject>Web server</subject><isbn>1424433967</isbn><isbn>9781424433964</isbn><isbn>9781424433971</isbn><isbn>1424433975</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kM1qwzAQhFVKoE3qJ-hFL2BXf5GsYwj9MQS7EFN6C5K9oSqObCy5kLevQ9NhYWb5lj0MQpiSjFKin4qyrD42dVGV-4wRkmdC5VRJdYMSPSfBhOBcK3qLlv-LVAu0vNxqShiVdygJ4ZvMEmvOlbpHnxtvunNwARvfYhcDDn03Rdd7PE-AZhpdPOP4NYKZofN4X7yn1gRo8am3rrvQMA1DP0YM_seNvT-Bj-EBLY6mC5BcfYXql-d6-5buqtdiu9mlTpOY2iMjQK1pmgY4kYqu27VspZ0TzIwedW5AcKIFt1oAy7VurOCUCdZKQRhfoce_tw4ADsPoTmY8H67F8F_HhVfc</recordid><startdate>200812</startdate><enddate>200812</enddate><creator>Jea-Tek Ryu</creator><creator>Byeong-hee Roh</creator><creator>Man-Pyo Hong</creator><creator>Hwan-Kuk Kim</creator><creator>Jeong-Wook Kim</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200812</creationdate><title>Analysis and its solution on security threats in SIP-based mobility support environments</title><author>Jea-Tek Ryu ; Byeong-hee Roh ; Man-Pyo Hong ; Hwan-Kuk Kim ; Jeong-Wook Kim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-bf20e1baccce306715d56d6b671ebf21f98ae430943b94e2899cb431242d64023</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Communication system security</topic><topic>Communications technology</topic><topic>Information analysis</topic><topic>Information security</topic><topic>Internet</topic><topic>IP networks</topic><topic>Network servers</topic><topic>Routing</topic><topic>Virtual reality</topic><topic>Web server</topic><toplevel>online_resources</toplevel><creatorcontrib>Jea-Tek Ryu</creatorcontrib><creatorcontrib>Byeong-hee Roh</creatorcontrib><creatorcontrib>Man-Pyo Hong</creatorcontrib><creatorcontrib>Hwan-Kuk Kim</creatorcontrib><creatorcontrib>Jeong-Wook Kim</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jea-Tek Ryu</au><au>Byeong-hee Roh</au><au>Man-Pyo Hong</au><au>Hwan-Kuk Kim</au><au>Jeong-Wook Kim</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Analysis and its solution on security threats in SIP-based mobility support environments</atitle><btitle>2008 International Conference on Innovations in Information Technology</btitle><stitle>INNOVATIONS</stitle><date>2008-12</date><risdate>2008</risdate><spage>603</spage><epage>607</epage><pages>603-607</pages><isbn>1424433967</isbn><isbn>9781424433964</isbn><eisbn>9781424433971</eisbn><eisbn>1424433975</eisbn><abstract>SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP security threats have been conducted, studies regarding security threats under a SIP application-level mobility supported environment are relatively fewer in number. The aim of this paper is to analyze security threats under a mobile SIP environment. Moreover we argue that our suggested approach, through an extended application of the SIP INFO method, handles SIP mobility threats effectively without additional functions or systems.</abstract><pub>IEEE</pub><doi>10.1109/INNOVATIONS.2008.4781767</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1424433967 |
ispartof | 2008 International Conference on Innovations in Information Technology, 2008, p.603-607 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4781767 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Communication system security Communications technology Information analysis Information security Internet IP networks Network servers Routing Virtual reality Web server |
title | Analysis and its solution on security threats in SIP-based mobility support environments |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T15%3A19%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Analysis%20and%20its%20solution%20on%20security%20threats%20in%20SIP-based%20mobility%20support%20environments&rft.btitle=2008%20International%20Conference%20on%20Innovations%20in%20Information%20Technology&rft.au=Jea-Tek%20Ryu&rft.date=2008-12&rft.spage=603&rft.epage=607&rft.pages=603-607&rft.isbn=1424433967&rft.isbn_list=9781424433964&rft_id=info:doi/10.1109/INNOVATIONS.2008.4781767&rft_dat=%3Cieee_6IE%3E4781767%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424433971&rft.eisbn_list=1424433975&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4781767&rfr_iscdi=true |