Browsing by Subject "Authentication and key agreement protocols"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item A survey of SIP authentication and key agreement schemes(Institute of Electrical and Electronics Engineers Inc., 2014) Kilinc H.H.; Yanik T.We present a survey of authentication and key agreement schemes that are proposed for the SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and security of the authentication and key agreement schemes are two critical factors that affect the VoIP applications with large number of users. Therefore, we have identified, categorized and evaluated various SIP authentication and key agreement protocols according to their performance and security features. Although the performance is inversely proportional to the security features provided in general, we observed that there are successful schemes from both the performance and security viewpoint. © 2014 IEEE.Item Efficient ID-based authentication and key agreement protocols for the session initiation protocol(Turkiye Klinikleri, 2015) Kilinč H.H.; Allaberdiyev Y.; Yanik T.; Erdem S.S.In a widely deployed VoIP system tens of thousands of clients compete for the SIP proxy server's authentication service. SIP protocol implementations have to meet certain QoS and security requirements. In this study new ID-based protocols are proposed for the SIP authentication and key agreement protocols. These protocols minimize the use of expensive pairing functions but still resist notable attacks. The security of the proposed protocols are analyzed and demonstrated with security proofs based on the BJM security model. Finally, the performance overhead of the proposed protocols are compared to ID-based SIP authentication and key agreement protocols given in the literature. © TUBITAK.