期刊文献+

用于互联网多媒体通信的SIP安全方案

SIP Security Scheme of Internet Multimedia Communication
下载PDF
导出
摘要 针对传统基于软件的SIP安全方案容易被盗用、欺骗和入侵的问题,结合可信计算技术,设计了对终端系统与用户身份的双层认证结构,提出了一种使用SIP进行互联网多媒体通信的安全方案.该方案利用可信平台模块和直接匿名证明算法设计了新的SIP注册协议,提高了多媒体通信系统的安全性.文中还利用可证明安全模型证明了注册协议的安全性,并对整个方案的特点进行了分析. As the traditional software-based SIP security schemes are vulnerable to embezzlement, deception and invasion, a dual authentication framework combined with the trusted computing technology is proposed for endpoint system and user identity. Then, a new SIP security scheme for Interuet multimedia communication is presented, which takes advantage of the trusted platform module and the direct anonymous attestation algorithm to design a new registration sub-protocol for improving the security of multimedia communication systems. Moreover, the security of the registration sub-protocol is verified by using the provable security model, and the characteristics of the whole scheme are finally analyzed.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第4期1-7,共7页 Journal of South China University of Technology(Natural Science Edition)
基金 国家"973"计划项目(2009CB320505) 国家科技支撑计划项目(2008BAH37B02 2008BAH37B08)
关键词 互联网多媒体通信 安全性 会话初始协议 可信计算 Internet multimedia communication security session initiation protocol trusted computing
  • 相关文献

参考文献15

  • 1Rosenberg J, Schulzrinne H, Camarillo G, et al. SIP : session initiation protocol, RFC 3261 [EB/OL]. (2002-06) [ 2011-07-08 ]. http ://www, ietf. org/rfc/rfc3261, txt.
  • 2Peterson J, Jennings C. Enhancements for authenticated identity management in the session initiation protocol (SIP), RFC 4474 [ EB/OL ]. ( 2006- 08 ) [ 2011- 07- 08 ]. http://www, ieff. org/rfe/rfe4474, txt.
  • 3Elwell J. Connected identity in the session initiation protocol (SIP) ,RFC 4916 [EB/OL]. (2007-06) [2011-07- 08 ]. http://www, ietf. org/rfc/rfc4916, txt.
  • 4Arkko J, Torvinen V, Camarillo G, et al. Security mechanism agreement for the session initiation protocol (SIP), RFC 3329 [EB/OL]. (2003-01) [2011-07-08]. http:// www. ietf. org/rfc/rfc3329, txt.
  • 5Sangster P, Khosravi H, Mani M, et al. Network endpoint assessment (NEA):overview and requirements, RFC 5209 [ EB/OL ]. (2008-06 ) [ 2011- 07- 08 ]. http: // www. ietf. org/rfc/rfc5209, txt.
  • 6Trusted Computing Group. TCG specification architecture overview specification, Revision 1.4 [ EB/OL ]. (2007- 08- 02) [ 2011- 07- 08 ]. http ://www. trustedcomputinggronp. org/resources/tcg_architecture_overview_version_14.
  • 7Trusted Computing Group. TCG TNC IF-TNCCS: TLV binding, specification vision 2.0 [ EB/OL ]. ( 2008- 01- 22 ) [ 2011-07-08 ]. http ://www. trustedcomputinggroup. org.
  • 8Gallery E, Mitchell C J. Trusted computing: security and applications [ J ]. Cryptologia ,2009,33 ( 3 ) :217-245.
  • 9Song Z, Molina J, Lee S, et al. Trustcube : an infrastructure that builds trust in client [ C ] //Proceedings of the First International Conference Future of Trust in Computing. Berlin-Heidelberg : Springer-Verlag, 2009:68- 79.
  • 10Song Zhexuan, Kotani Seigo, Masuoka Ryusuke. Building an independent integrated authentication service [ C ]// The 9th International Conference for Young Computer Scientists. New York: IEEE Computer Society, 2008: 2254-2259.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部