Kilinc H.H.Yanik T.2024-07-222024-07-2220141553877Xhttp://akademikarsiv.cbu.edu.tr:4000/handle/123456789/16991We present a survey of authentication and key agreement schemes that are proposed for the SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and security of the authentication and key agreement schemes are two critical factors that affect the VoIP applications with large number of users. Therefore, we have identified, categorized and evaluated various SIP authentication and key agreement protocols according to their performance and security features. Although the performance is inversely proportional to the security features provided in general, we observed that there are successful schemes from both the performance and security viewpoint. © 2014 IEEE.EnglishInternet telephonyNetwork architectureSecurity systemsSurveysVoice/data communication systemsAuthentication and key agreement protocolsAuthentication and key agreementsAuthentication protocolsCritical factorsSecurity featuresSIPSIP securityVoIP applicationsNetwork securityA survey of SIP authentication and key agreement schemesArticle10.1109/SURV.2013.091513.00050