Results 1 to 10 of about 154,799 (290)

Securing Session Initiation Protocol [PDF]

open access: yesSensors, 2022
The session initiation protocol (SIP) is widely used for multimedia communication as a signaling protocol for managing, establishing, maintaining, and terminating multimedia sessions among participants.
Osama Younes, Umar Albalawi
doaj   +4 more sources

A robust ECC based mutual authentication protocol with anonymity for session initiation protocol. [PDF]

open access: yesPLoS ONE, 2017
Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services.
Zahid Mehmood   +4 more
doaj   +2 more sources

An improved and efficient mutual authentication scheme for session initiation protocol. [PDF]

open access: yesPLoS ONE, 2019
Qiu et al. made a security analysis about the protocols of Chaudhry et al. and Kumari et al. in 2018, and they pointed out that there are many security weaknesses in the protocols. To improve the security, Qiu et al.
Yuanyuan Zhang, Kunming Xie, Ou Ruan
doaj   +2 more sources

An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy. [PDF]

open access: yesPLoS ONE, 2018
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al.
Shuming Qiu   +3 more
doaj   +2 more sources

Biometrics based authentication scheme for session initiation protocol. [PDF]

open access: yesSpringerplus, 2016
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal ...
Xie Q, Tang Z.
europepmc   +4 more sources

Session Initiation Protocol Attacks and Challenges

open access: yes, 2012
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the
Keshavarz, Hassan   +2 more
openaire   +3 more sources

Classification of Abnormal Signaling SIP Dialogs Through Deep Learning

open access: yesIEEE Access, 2021
Due to the high utilization of the Session Initiation Protocol (SIP) in the signaling of cellular networks and voice over IP multimedia systems, the avoidance of security vulnerabilities in SIP systems is a major aspect to assure that the operators can ...
Diogo Pereira   +2 more
doaj   +1 more source

A Machine Learning Approach for Prediction of Signaling SIP Dialogs

open access: yesIEEE Access, 2021
In this paper, we propose a machine learning methodology for prediction of signaling sessions established with the Session Initiation Protocol (SIP). Given the increasing importance of predicting and detecting abnormal sequences of SIP messages to avoid ...
Diogo Pereira   +2 more
doaj   +1 more source

Research on Vulnerability Discovery for SIP Based on Protocol Analysis and Fuzz Test [PDF]

open access: yesJisuanji gongcheng, 2016
Aiming at the potential security vulnerabilities of Session Initiation Protocol(SIP) and the lack of research work for exploiting SIP vulnerabilities,an exploiting solution of SIP vulnerabilities is proposed based on protocol analysis and fuzz test.On ...
LI Jindong,WANG Tao,WU Yang,LEI Dong
doaj   +1 more source

A Performance Evaluation of In-Memory Databases Operations in Session Initiation Protocol

open access: yesNetwork, 2022
Real-time communication has witnessed a dramatic increase in recent years in user daily usage. In this domain, Session Initiation Protocol (SIP) is a well-known protocol found to provide trusted services (voice or video) to end users along with ...
Ali Al-Allawee   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy