期刊文献+

软交换中的一种安全策略 被引量:3

Security Strategy in Softswitch
下载PDF
导出
摘要 针对软交换中的SIP协议没有定义自身的安全机制,提出了一个可行的解决方案·简单叙述了软交换中的SIP协议的功能,特点和工作机制,并指出SIP协议中存在的安全性问题,详细分析原本为电子邮件明文的加密和签名设计的加密方法PGP(PrettyGoodPrivacy)的安全策略,加密过程,安全强度及其性能等·提出了将应用广泛、安全性高的安全策略PGP引入SIP协议中,以满足SIP消息传输中的安全要求·具体阐述了PGP在SIP协议中应用的实现方法,列举了经PGP加密的SIP邀请消息格式和用PGP数字签名的SIP消息格式· A feasible solution is proposed to the security problem of SIP protocol in softswitch since no security strategy has been defined by SIP itself. Describes briefly the function characters and working mechanism of SIP protocol in softswitch, especially its existing security problem. Then the security strategy, encryption process, security and performance of PGP (Pretty Good Privacy) which was originally designed for encryption and signature of e-mail are analyzed in detail. The widely-used highly secure PGP security strategy is thus introduced into SIP protocol to meet the security requirements of SIP message transmission. Expatiates the implementation of PGP in SIP protocol and exemplifies the formats of SIP INVITE message with PGP encryption and with digital PGP signature.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2004年第11期1042-1045,共4页 Journal of Northeastern University(Natural Science)
基金 国家高技术研究发展计划项目(863 701 2 4 863 708 5 4)
关键词 软交换 SIP 安全策略 PGP 加密 softswitch SIP security strategy PGP encryption
  • 相关文献

参考文献8

  • 1[1]RFC2543. SIP: session initiation protocol[S].
  • 2[2]Handley M,Schulzrinne H. draft-ietf-mmusic-sip-04.txt[S]. IETF Draft,Apr. 1998.
  • 3[4]Salsano S, Veltri L. SIP security issues: the SIP authentication procedure and its processing load[J]. IEEE Network, 2002,16(6):38-44.
  • 4[5]Reynolds B, Ghosal D. STEM: secure telephony enabled middlebox[J]. IEEE Communication Magazine, 2002,40(10):52-58.
  • 5[6]RFC2401. Security architecture for the internet protocol[S].
  • 6[7]RFC2246. The TLS protocol version 1.0[S].
  • 7[9]RFC 2045. MIME: format of Internet message bodies[S].
  • 8[10]RFC 2015. MIME security with pretty good privacy[S].

同被引文献16

  • 1赵慧玲.NGN和软交换[J].中兴通讯技术,2005,11(3):30-34. 被引量:18
  • 2Williams S.The softswitch advantage[J],IEE Review,2002,48(4): 25-31.
  • 3Gou Xiantai,Jin Weidong,Zhao Duo. Multi-agent based softswitch[A],Proceedings-IEEE/WIC/ACM International Conference on Intelligent Agent Technology.IAT 2004[C], Beijing,China,2004:341-344.
  • 4Lin Na,Wang Ze,Wang Guangxing. Research of a Security Mechanism in Softswitch[A],ICCC2004:PROCEEDIN GS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION[C],Beijing. 2004,1:504-508.
  • 5Gisler,A.,Loretz.M.,Stricker,A.SIP Security[M], Diplomarbeit, Zurcher Hochschule Winterthur,2003.
  • 6Abdi R.Modarressi,Seshadri Mohan.Control and Management in Next Generation Networks:Challenges and.
  • 7Singh K,Schulzrinne H.Peer-to-peer Internet telephony using SIP.Technical Report CUCS-044-04[R].New York:Columbia University,2004.
  • 8Rosenberg J,Schulzrinne H,Camarillo G,et al.SIP:session initiation protocol,RFC3261[R].IETF,2002.
  • 9Ratnasamy S,Francis P,Handley M,et al.A scalable content-addressable network[C]∥Proceedings of ACM SIGCOMM.New York:ACM Press,2001:161-172.
  • 10Stoica I,Morris R,Karger D,et al.Chord:a scalable peer-to-peer lookup service for Internet applications[C]∥Proceedings of ACM SIGCOMM.New York:ACM Press,2001:149-160.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部