Demonstration of Spam and Security Mechanism in SIP-Based VoIP Services

This demonstration presents spam scenarios and a lightweight security mechanism for protecting spam calls in SIP- based VoIP services. Generally, VoIP providers have been applying only the HTTP digest scheme to authenticate a UA. They may be not consider protecting SIP signaling between the light-we...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Jaesic Choi, Kangseok Chae, Jaeduck Choi, Souhwan Jung
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This demonstration presents spam scenarios and a lightweight security mechanism for protecting spam calls in SIP- based VoIP services. Generally, VoIP providers have been applying only the HTTP digest scheme to authenticate a UA. They may be not consider protecting SIP signaling between the light-weight UA and the SIP proxy using the TLS mechanism since it suffers from the heavy overhead for computation on the resource-constrained UA. Therefore, the spammer can send SIP messages such as INVITE or 200 OK directly to the UA or the SIP proxy, and then communicate with the user by establishing a media channel. This paper demonstrates several spam scenarios when the TLS mechanism is not established at the light-weight SIP UA. Besides, we will show that these spam calls can be protected by using our proposed security scheme instead of TLS mechanism.
ISSN:2331-9852
DOI:10.1109/CCNC.2009.4785022