Search
نمایش تعداد 1-10 از 27
A load scheduler for SIP proxy servers: design, implementation and evaluation of a history weighted window approach
The widespread use of Session Initiation Protocol as a signalling protocol has created various challenges.
An important one is that its throughput can be severely degraded when an overload happens in the proxy
server because of several...
A new SIP authentication scheme by incorporation of elliptic curve cryptography with ticket server
Today, Session Initiation Protocol (SIP) is considered as predominant protocol for Voice over IP (VoIP) systems. When the client require to use SIP services, as a demand of accessing proxy server, authentication will be important challenge. SIP...
Design, implementation and performance evaluation of a proactive overload control mechanism for networks of SIP servers
The extent and diversity of systems, provided by IP networks, have made various technologies approach integrating different types of access networks and convert to the next generation network (NGN). The session initiation protocol (SIP) with respect...
A secure and robust elliptic curve cryptography‐based mutual authentication scheme for session initiation protocol
Session Initiation Protocol (SIP) is known as multimedia communication protocol based on IP, which is leveraged to provide signalling as well as instant messaging services. Since SIP services are widely used by Internet users, an important challenge...
Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP
With the advent of the internet, Voice over Internet Protocol (VoIP) has obtained a
considerable amount of attention due to its low cost, and ease of implementation.
Similar to other emerging technologies, VoIP faces ...
An Anomaly Based VoIP DoS Attack Detection and Prevention Method Using Fuzzy Logic
Today, Voice over IP (VoIP), also known as Internet telephony, has received lots of attention because of its efficiency and flexibility. Meanwhile, features such as being in text form, has made the Session Initiation Protocol (SIP) as a predominant...
Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic
and signaling protocols such as Session Initiation Protocol (SIP), have been subjected this technology to various kinds of attacks. Denial of Service (DoS) attack, due to the flooding different kinds of SIP messages, is one of the most well-known type...
An Empirical Study of Security of Voip System
Abstract—As VoIP (Voice-over-IP) Services are becoming more popular, various types of attacks against them are increasing. The main protocol that is used in VoIP is SIP. SIP is subject to various types of attacks including ...