A survey of SIP authentication and key agreement schemes
No Thumbnail Available
Date
2014
Authors
Journal Title
Journal ISSN
Volume Title
Abstract
We present a survey of authentication and key agreement schemes that are proposed for the SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and security of the authentication and key agreement schemes are two critical factors that affect the VoIP applications with large number of users. Therefore, we have identified, categorized and evaluated various SIP authentication and key agreement protocols according to their performance and security features. Although the performance is inversely proportional to the security features provided in general, we observed that there are successful schemes from both the performance and security viewpoint. © 2014 IEEE.
Description
Keywords
Internet telephony , Network architecture , Security systems , Surveys , Voice/data communication systems , Authentication and key agreement protocols , Authentication and key agreements , Authentication protocols , Critical factors , Security features , SIP , SIP security , VoIP applications , Network security