Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Design》 2007-22
Add to Favorite Get Latest Update

Research on security mechanism and applied model in SIP

GE Lin,MA Hong(National Digital Switching System Engineering and Technological Research and Development Center,Zhengzhou 450002,China)  
With the development of NGN which has Soft witch as the core,the security problem of the SIP application is becoming more and more important.Based on the presentation of the security characters of SIP,and aiming at all kinds of possible security threats,the security mechanism in SIP is discussed.Two major aspects of the mechanism— the security of signaling and the security of media are analyzed in detail.With the analysis and character of the network,this an applied model is presented and described in detail.At last it shows the potential problems of this model in real applied circumstance.
【Fund】: 国家863高技术研究发展计划基金项目(2005AA121210)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 5 Hits
1 Liu Hua, Wang Kun (Key Laboratory of Computer Network and Information Security of the Ministry of Education, Xidian University, Xi’an710071, China);A Study of PKI-based SIP Security Based on PKI[J];It Age;2005-02
2 ;Research on SIP Security Mechanism[J];Guangdong Communication Technology;2004-04
3 Chu Taishan Pan Xuezeng (Department of Computer Science and Engineering,Zhejiang University,Hangzhou 310027);SIP SECURITY MODEL AND ITS IMPLEMENTATION[J];Computer Applications and Software;2004-12
4 MIN Han, CHEN Shen-meng, ZHANG Qi-hui (School of Computer, Wuhan University, Wuhan 430072, China);Research on security in SIP-based network[J];Computer Engineering and Design;2004-03
5 HE Ping, JIANG Yajun(Guangzhou PanYu Polytechnic, Guangzhou, 511483,China);Security Mechanism Study on SIP Application[J];Microcomputer applications;2005-05
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Li Xuejie Jin Zhigang Dai Jufeng(Tianjin University,Tianjin 300072);Design of secure SIP based on HTTP digest authentication[J];Electronic Measurement Technology;2007-12
2 JIA Yan~1 XU Dong Sheng~2 BU Zhe~3 (1.School of Computer Science and Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China;2.Network Engineering Department,Hebei Software Institute,Baoding 071000,China;3.Institute of Communication Standards Research,CATR,MII,Beijing 100083,China);SIP protocol security issues and solutions[J];Application of Electronic Technique;2008-07
3 Zhang Zhaoxin Fang Binxing Hu Mingzeng Zhang Hongli (Research Center of Computer Network and Information Security Technology,Harbin Institute of Technology,Harbin 150001);Research on the security of session initation protocol(SIP)networks[J];Chinese High Technology Letters;2008-03
4 MEI Luhai(Zhejiang Institute of Mechanical & Electrical Engineering,Hangzhou 310053,China);Design of a New Substation Video Monitoring System Based on SIP[J];Automation of Electric Power Systems;2010-03
5 FAN Zi-fu,WAN Xiao-yu (Next Generation Network Application Technology Institute,Chongqing University of Posts and Telecommunications,Chongqing 400065);SIP Security Method Based on S/MIME[J];Computer Engineering;2009-05
6 LI Shi-da 1,2 ,HU Yue 1 ,WANG Xing-qiu 1 ,YU Zhen 1 (1.School of Information Engineering,University Science technology of Beijing,Beijing 100083,China; 2.Institue of Computing Technology,Chinese Academy of Sciences,Beijing 100080,China);Realization of SIP authentication scheme based on ECC[J];Journal of Computer Applications;2007-02
7 Chen Ping1 Yan Guangxing21(Department of Computer Science and Engineering,Shanghai Jiaotong University,Shanghai 200030,China)2(Institute of Information Security,Shanghai Jiaotong University,Shanghai 200030,China);STUDY ON EXTENSIBLE SECURITY ARCHITECTURE OF SOFTSWITCH[J];Computer Applications and Software;2007-07
8 ZHANG Rui1,JIANG Hua1,2,YANG Ya-tao21.College of Communication Engineering,Xidian University,Xi'an 710071,China 2.Department of Communication Engineering,Beijing Electronic Science and Technology Institute,Beijing 100070,China;SIP authenticated key agreement scheme based on SGC-PKE[J];Computer Engineering and Applications;2010-05
9 ZHOU Ji-cheng,XU Kai-yong,ZHAO Bin,WU Ping Institute of Electronic Technology,PLA University of Information Engineering,Zhengzhou 450004,China;Identity-based authentication and key agreement scheme of SIP[J];Computer Engineering and Applications;2010-05
10 HOU Bin LU Yu-qin YEAP Tet-hin (Inst.of Electronic Eng.,Beijing Univ.of Post and Telecommunication,Beijing 100876,China);Design of Security Communication Solution in SIP Based Application[J];Journal of Sichuan University(Engineering Science Edition);2007-S1
China Proceedings of conference Full-text Database 6 Hits
1 Hua jun Huang zhiqiu Zhou hua (Nanjing University ofAero & Astro,Nanjing,210016);SIP security Model based on Transaction Level Extension[A];[C];2007
2 Chen li~1 Liu Xinran~(1,2) Luo Senlin~3 1.Beijing University of Posts and Telecommunications,Beijing,100876; 2.National Computer network Emergency Response technical Team/Coordination Center,Beijing,100029; 3.Beijing Institute of Technology,Beijing,100081;Analysis of Attack of Tearing Down VoIP Sessions[A];[C];2007
3 Kangfeng Zheng, Yixian Yang, Xinxin Niu, Xiangmao Su, Xiujuan Wang (School of Information and Engineering, Beijing University of Posts and Telecommunications, Beijing, 100876 China);Research on Stream Media Attack in VoIP System[A];[C];2005
4 Kangfeng Zheng, Yixian Yang, Xinxin Niu, Weiping Deng, Xiujuan Wang (School of Information and Engineering, Beijing University of Posts and Telecommunications, Beijing, 100876 China);Research on Denial of Service Attack Against VoIP System[A];[C];2005
5 Zhangzhaoxin, Fangbinxing, Humingzeng, Zhanghongli ( Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin, 150001) ( National Computer Network & Information Security Administrative Center, Beijing, 100029);Network Security Research Based on SIP[A];[C];2005
6 Zhang Zhaoxin~1 Fang Binxing~1 Zhang Hongli~1 Jiang Chunxiang~2 (1.Research Center of Computer Network and Information Security Technology,Harbin Institute of Technology,Harbin,150001) (2.HeiLongjiang Communications Administration,150001);Safe Communicated Model of SIP Network Based on Improved SIP Protocol[A];[C];2007
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 WU Jin,ZHANG Feng-li,HE Xing-gao,LU Qing (School of Computer Science and Engineering, University of Eletronic Science and Technology of China Chengdu 610054);Research on SIP Security Mechanism[J];Journal of University of Electronic Science and Technology of China;2007-06
2 CHEN Dong-lang,DONG-Kun,ZHU Cui-tao(College of Electronic Engineering,South-Central University of Nationalities, Wuhan,Hubei 430073,China);Design of multimedia conference system agent with JAIN SIP[J];Computer and Information Technology;2006-04
3 ;SIP协议的现状及应用[J];Telecommuni Cations Information;2002-05
4 Xu Xiaoning, Peng Zhiwei, Wu Yuhong (1. School of Telecommunications, Xidian Unniversity 710071 China 2. Dept. of Advanced Technology, ZTE Corporation, Shenzhen, 518057, China);Improvement of TLS in the Wireless Environment and its Security Analysis[J];It Age;2005-01
5 HU Cai-qiao,XIA Ying-ying,LU Zhong-liang(Jiangxi University of Science and Technology,Ganzhou 341000,China);Research on Security Construction and Transparent Authentication of NGN Network Device[J];Journal of Jiamusi University(Natural Science Edition);2008-01
6 YANG Peng~1,ZHAO Bo~1,WANG Kun~2,ZHOU Li-hua~1(1.Institute of Multimedia Technology, Xidian University,Xi’an Shaanxi 710071, China;2.Key Lab of Institute of Computer Network and Information Security Ministry of Education, Xidian University,Xi’an Shaanxi 710071, China);Using Java technology to implement the SIP communication[J];Computer Applications;2005-02
7 OUYANG Xing-ming,CHENG Jian(College of Computer Science & Technology, Huazhong University of Science and Technology, Wuhan Hubei 430074, China);Developing SIP-based applications with JAIN SIP[J];Computer Applications;2005-03
8 YU Zhi-chun,FANG Bin-xing,ZHANG Zhao-xin(College of Computer Science and Technology,Harbin Institute of Technology,Harbin Heilongjiang 150001,China);Study on the security of SIP[J];Journal of Computer Applications;2006-09
9 JI Ning, LIN Xiao, PU Jie-xin(Electronic Information Engineering College, Henan University of Science & Technology, Luoyang Henan 471003, China);Research on secure authentication based on session initial protocol[J];Journal of Computer Applications;2007-03
10 Zhou Yu Guan Haibing Bai Yingcai (College of Information Security Engineering,Shanghai Jiaotong University,Shanghai 200030,China);THE TECHNIQUES ON IMPLEMENTING SIP BASED ON JAIN SIP[J];Computer Applications and Software;2005-03
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved