An Improved SIP Security Mechanism of Softswitch Network

Article Preview

Abstract:

This paper introduces a typical softswitch network system, points out the security threats of SIP softswitch network that may exist, select suitable HTTP digest authentication mechanism for softswitch network in the analysis of the SIP security mechanism. For the deficiencies of HTTP digest authentication, by extending SIP message header field contents, learning SRTP and other methods to improve it. Improved HTTP digest authentication mechanism can effectively avoid the server camouflage, registration hijacking, message tampering and other security threats, to ensure the security of SIP protocol application layer, improved security of softswitch network.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1636-1639

Citation:

Online since:

November 2013

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Pang Rui. The core Technology Of softwhich and the application [D]. Beijing: Beijing University of Posts and Telecommunications, 2011: 7-8.

Google Scholar

[2] Huanfeng Peng. SIP security mechanism based on improved HTTP digest authentication [J]. Microcomputer Application, 2011, 30 (6): 53-54.

Google Scholar

[3] Rongyu CUI. Analysis of NGN network structure system [J]. Information & Communications, 2012, (4): 175 - 176.

Google Scholar

[4] Zhaohua Long, Mingzhe Li. Design of SIP security mechanism on application-layer [J]. Meter Computer Engineering and Design, 2010, 31 (15): 3350-3352.

Google Scholar

[5] Wei Guo. Discussion of Soft-switching Network Technology [J]. Jiangsu Electrical Engineering, 2010, 29 (5): 58-59.

Google Scholar

[6] Chen Chuan. Softswitch Network Security Analysis and Communication [J]. Network Security, 2011, (7): 55.

Google Scholar

[7] Qinghong Zhang. Reseach on Private Network NGN System Security Solutions [J]. Radio Communications Technology, 2011, 37 (5): 7-8.

Google Scholar

[8] Qinghui Xie. Analysis of NGN Security [J]. Inner Mongolia Science Technology & Economy, 2010, (11): 91.

Google Scholar