The SIP Security Communication Base on Improved Key Agreement Algorithm

Article Preview

Abstract:

This paper proposed a SIP security communication mechanism base on SAKA algorithm, combined with the identity authentication and key negotiation. This paper illustrated the communication process design steps and the SIP mechanism, and theoretical analysis of the safety performance of the mechanism. Through the network simulation platform to simulate the efficiency of the proposed scheme and compare with other authentication mechanism.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 860-863)

Pages:

2754-2757

Citation:

Online since:

December 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Li Xin Ye Ming on OPNET the MODELER network modeling and simulation - Xi'an: Xidian University Press , 2006. 2: 32 -107.

Google Scholar

[2] Zhang Zhijiang LEE Wing-, Liuhong Ning, and Liu Yunjie. The IMS business-critical technology to achieve - Beijing: People's Posts & Telecom Press , 2008. 2: 15 -24.

Google Scholar

[3] Xu Peiwen Xie Shuizhen, Young from Paul. Softswitch and SIP practical technology –Machinery Industry Press , 2007: 45 -156.

Google Scholar

[4] Kong Song, Liang Jingyuan . 3 the GPP IMS real-time business session of seamless mobility program of modern telecommunications technology 10 2005. 10.

Google Scholar

[5] Joirgen F. Next generation broadband mobile-Fixed convergence and standardization. ETSI, 2007, 5.

Google Scholar

[6] Yao Yukun, Wang Zhi. The IMS network using SIP protocol delay improvement strategies. Networking and communications technology . 2009, 3.

Google Scholar

[7] Du Yu. The IMS network SIP protocol expansion and session performance. Journal – Chongqing: Chongqing University of Posts and Telecommunications, (2006).

Google Scholar

[8] Li Xiaoxia, Song Maoqiang. Study on [D][D]. security communication mechanism SIP Beijing: Beijing University of Posts and Telecommunications, (2007).

Google Scholar

[9] Wang Yufei, Fan Mingyu. An implementation of SIP security communication system based on the HTTP digest authentication.

Google Scholar