SIP security
SIP protocol
Article REF: TE7530 V1
SIP security
SIP protocol

Author : François TOUTAIN

Publication date: November 10, 2003 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

5. SIP security

The security situation in a SIP system is similar to that encountered in H.323 architectures. The requirements are the same, covering aspects such as user and system authentication, message confidentiality (both for signaling and multimedia flows) and message integrity.

The various SIP messages can be encrypted to prevent them from being read by a malicious user, and to prevent the latter from perceiving the communication "pattern" (who is calling whom and how). Three types of encryption are available:

  • end-to-end encryption of the message body and certain headers (only the sender and recipient know the content);

  • close-to-close encryption (server-to-server), at network or transport level, using either IPSEC (IP Security) or TLS (Transport Layer Security), like H.235 to prevent eavesdropping...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Networks and Telecommunications"

( 171 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details
Contact us