Secure and Efficient Authentication Scheme for VoIP Communications

O Youness - IJCI. International Journal of Computers and …, 2023 - journals.ekb.eg
Over the past decade, Voice over IP (VoIP) has evolved from being a voice communication
system into a robust unified communications engine. All VoIP devices rely on a single …

Towards public key infrastructure less authentication in session initiation protocol

AA Hasib, A Azfar, MS Morshed - arXiv preprint arXiv:1002.1160, 2010 - arxiv.org
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice
over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP …

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card

S Kumari, F Wu, X Li, MS Farash, Q Jiang… - Multimedia Tools and …, 2016 - Springer
In recent years, Voice over Internet Protocol (VoIP) has gained more and more popularity as
an application of the Internet technology. For various IP applications including VoIP, the …

A new authentication mechanism and key agreement protocol for sip using identity-based cryptography

J Ring, K Choo, E Foo, M Looi - Proceedings of the AusCERT …, 2006 - eprints.qut.edu.au
The Session Initiation Protocol (SIP) protocol is commonly used to establish Voice over IP
(VoIP) calls. IETF SIP standards do not specify a secure authentication process thus …

Efficient ID-based authentication and key agreement protocols for the session initiation protocol

HH Kilinc, Y Allaberdiyev, T YANIK… - Turkish Journal of …, 2015 - journals.tubitak.gov.tr
In a widely deployed VoIP system tens of thousands of clients compete for the SIP proxy
server's authentication service. SIP protocol implementations have to meet certain QoS and …

Implementing a secure VoIP communication over SIP-based networks

WB Hsieh, JS Leu - Wireless Networks, 2018 - Springer
Abstract Recent years the Session Initiation Protocol (SIP) is commonly used in establishing
Voice over IP (VoIP) calls and has become the centerpiece for most VoIP architecture. As …

A survey of SIP authentication and key agreement schemes

HH Kilinc, T Yanik - IEEE communications surveys & tutorials, 2013 - ieeexplore.ieee.org
We present a survey of authentication and key agreement schemes that are proposed for the
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …

An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC

H Arshad, M Nikooghadam - Multimedia Tools and Applications, 2016 - Springer
The session initiation protocol (SIP) is a powerful and superior signaling protocol for the
voice over internet protocol (VoIP). Authentication is an important security requirement for …

Practical authentication scheme for SIP

S Wu, Q Pu, F Kang - Peer-to-Peer Networking and Applications, 2013 - Springer
Abstract The Session Initiation Protocol (SIP) is commonly used to establish Voice over IP
(VoIP) calls. However, the original authentication scheme for SIP-based service typically …

Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things

PK Dhillon, S Kalra - Multimedia Tools and Applications, 2019 - Springer
Since last decade, VoIP is transitioning from being a voice scheme to the most powerful
unified communications engine. All VoIP systems uses the Session Initiation Scheme that …