期刊文献+

一种基于SIP下VoIP身份认证技术的解决方案 被引量:5

A New Approach of VoIP Authenticated Identity based on SIP
下载PDF
导出
摘要 VoIP系统是一项通过IP网络数据包传送语音的通信业务,保证VoIP的安全是提供IP通信业务的前提,而身份认证则是IP网络安全体制中最为重要的环节之一.随着SIP正成为VoIP通信系统的主流协议,文章在总结了当前VoIP系统对呼叫者身份进行认证的方法的基础上,提出了一种基于智能卡和SIP来电ID的双因素身份认证技术解决方案,并通过模拟攻击实验,对其安全性进行了分析. VoIP system is a communication transaction that transported voice by wrapped IP packets, the premise of proriding IP communication service is to guarantee its security. Authentication plays one of the most important role in IP network security mechanism. As IP is becoming the most essential protocol in VoIP field, the ways of authentication applied in present VoIP systems are summarized and a new solution is put forward in this paper, it is a kind of double-factor authentication technology that based on smart card and SIP caller-ID. Its security was analyzed by simulated attacking experiments.
出处 《江西师范大学学报(自然科学版)》 CAS 北大核心 2008年第2期237-241,共5页 Journal of Jiangxi Normal University(Natural Science Edition)
基金 江西省教育厅2007科技项目(GJJ07130)
关键词 SIP 身份认证 VOIP 智能卡 来电ID SIP authenticated identity VoIP smart card caller- ID
  • 相关文献

参考文献8

  • 1Rosenberg J, Schulzrinne H, Camafillo G. SIP: session initiation protocol [ EB/OL]. [ 2007-03-21 ]. ftp://ftp, rfceditor, org/in-notes/ rfc5261. txt.
  • 2白建军.SIP揭密[M].北京:人民邮电出版社,2003..
  • 3王斌,李建华.基于智能卡的动态身份认证机制[J].通信学报,2003,24(8):117-121. 被引量:5
  • 4Peterson J. Session initiation protocol(SIP) authenticated identity body(AIB) format[ EB/OL ]. [ 2(107-03-21 ]. ftp://ftp, rfceditor, org/in- notes/rfc3983, txt.
  • 5Cao F, Jennings C. Providing response identity and authentication in IP telephony [ J ]. Availabhty, Rehabhty and Security, 2003,49 (4): 1 196-1 198.
  • 6Chien L H. Security of two remote user authentication schemes using smart cards[J]. IEEE Trans on Consumer Electronics,2003,49(4) : 1 196-1 198.
  • 7Peterson J, Jennings C. Enhancements for authenticated identity management in the session initiation protocol(SIP)[ EB/OL]. [ 2007-03- 21 ]. ftp://ftp, rfceditor. org/innotes/rfc4474. txt.
  • 8Srinivasan R, Vaidehi V, Harish K. Authentication of signaling in VolP applications [ C ]. Washington DC: IEEE Computer Society, 2005 : 530-533.

二级参考文献7

  • 1WANG T Y. Password authentication using public-key encryption[A]. Proceedings of International Camahan Conference on Security Technology[C]. Zurich, Switzerland, 1983.35-38.
  • 2SHAM1R A. Identity-based cryptosystems and signature schemes[A]. CRYPTO'84[C]. New York, Berlin: Springer-Vexing, 1985.47-53.
  • 3YUH M T, JINN K J. ID-based cryptographic schemes using a non-interactive public-key distribution system[A]. Proceeding of Computer Security Applications Conference[C]. Arizona, USA,1998. 237-243.
  • 4LAMPORT L. Password authentication with insecure communications[J]. Communications of ACM, 1981, 24( 11): 770 -772.
  • 5HARN L. A public-key based dynamic password scheme[A]. Proceedings of the Symposium on Applied Computing[C]. Kansas,USA,1991. 430-435.
  • 6CHIN C C, REN J H, DANIEL J B. Using smart cards to authenticate passwords[A]. Proceedings of IEEE International Camaban Conference on Security Technology[C]. Ottawa, Canada, 1993. 154 -156.
  • 7LIN C H, CHANG C C, LEE R C T. A rccord-orientexi cryptosystem for database sharing[J]. The Computer Journal, 1992, 35(6):658-660.

共引文献20

同被引文献42

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部