sip protocol
Recently Published Documents


TOTAL DOCUMENTS

71
(FIVE YEARS 7)

H-INDEX

4
(FIVE YEARS 1)

CONVERTER ◽  
2021 ◽  
pp. 627-634
Author(s):  
Wang Fei, Dong Yu

The network structure of P2P-SIP system based on JXTA is one of the core technologies in industrial intelligent Internet.JXTA is an open peer-to-peer platform, which provides basic application services for building P2P network. This paper chooses JXTA development platform to build P2P network, and then constructs SIP soft terminal on it. Firstly, it introduces the background knowledge, related research, P2P network technology, JXTA technology and SIP protocol. Then, the feasibility of p2p sip system is analyzed, including the combination of P2P and sip, network structure and framework structure. Then the routing mechanism of JXTA is deeply studied, including distributed index of shared resources, limited range traversal, dynamic view of sink node and loose and consistent distributed hash table (DHT). At the same time, this paper proposes an improvement strategy to overcome the shortcomings of JXTA routing mechanism such as limited range traversal and loose consistent DHT, that is, introducing the chord ring of consistent hash algorithm in the aggregation network layer. Based on the in-depth study of JXTA structured network and SIP protocol, a P2P SIP system is designed and implemented. The experimental results show that the system can maintain normal SIP communication without maintaining the central server.


CONVERTER ◽  
2021 ◽  
pp. 59-64
Author(s):  
Lei Shi, Chen Shi, Hongying Wang

Session Initiation Protocol (SIP) is one of the most important signaling connection protocols in the field of VoIP (Voice over Internet Protocol). However, the existing SIP network has some problems such as manual configuration, difficult maintenance and poor scalability. With the development of P2P (Peer-to-Peer) technology, the combination of SIP and P2P has become a trend. JXTA is an open peer-to-peer platform, which provides basic application services for building P2P network. The topic chooses JXTA development platform to build P2P network, and then constructs SIP soft terminal on it. Based on the in-depth study of JXTA structured network and SIP protocol, a P2P SIP system is designed and implemented. The system can maintain normal SIP communication without maintaining the central server. In this paper, the detailed design and implementation process of P2P-SIP system are given, including node join and leave, user join, user search and session establishment. This paper focuses on the implementation process of user search, that is, the collaborative process of discovery service, resolution service, aggregation service and endpoint routing service. Finally, the feasibility of the system is verified by functional test.


Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. However they remain a particular computation environment, characterized by the deficiency of pre-existed and centralized infrastructure. In the other hand, SIP protocol, which knows a huge booming in internet networks, requires centralized entities, like proxy server, registrar server and location service; consequently SIP is not adapted to Ad Hoc networks. We have presented in a new technique VNSIP (Virtual Network for Session Initiation Protocol) to fix the problem related to constraints of SIP deployment in MANET (Mobile Ad Hoc Networks). In this paper we use a new algorithm which we have called MCAC (MANET Call Admission Control) to improve VNSIP Performances


2020 ◽  
Vol 1 (1) ◽  
pp. 1-6
Author(s):  
A. Rahul ◽  
B. Suresh kumar ◽  
S.K. Prashanth

VoIP services are becoming increasingly a big competition to existing telephony services (PSTN). Hence, the need arises to protect VoIP services from all kinds of attacks that target network bandwidth, server capacity or server architectural constrains. SIP Protocol is used for VoIP connection establishment. It works based on either TCP or UDP Protocols. This protocol structure is almost as same as HTTP Protocol, i.e. for every request there will be some response, even though the request is invalid. HTTP Protocol is prone to flooding attacks, like SYN-Flood attack. Because of Session Initiation Protocol (SIP) is same as HTTP, SIP is also prone to Flooding attacks. The proposed Intrusion Detection System (IDS) is used to detect the intruders in telephony system. Genetic algorithm is used to recognize the authorized user. VoIP Flood Detection System (VFDS) is aimed to detect TCP Flooding attacks and SIP Flooding attacks on SIP devices using Jacobian Fast and Hellinger distance algorithms. The Jacobian Fast Algorithm fixes the threshold limit and Hellinger distance calculation is a statistical anomaly based algorithm uses to detect deviation in traffic


2019 ◽  
Vol 14 (4) ◽  
pp. 518-529 ◽  
Author(s):  
Waleed Nazih ◽  
Yasser Hifny ◽  
Wail Elkilani ◽  
Tamer Abdelkader ◽  
Hossam Faheem

The Session Initiation Protocol (SIP) is one of the most common protocols that are used for signaling function in Voice over IP (VoIP) networks. The SIP protocol is very popular because of its flexibility, simplicity, and easy implementation, so it is a target of many attacks. In this paper, we propose a new system to detect the Denial of Service (DoS) attacks (i.e. malformed message and invite flooding) and Spam over Internet Telephony (SPIT) attack in the SIP based VoIP networks using a linear Support Vector Machine with l1 regularization (i.e. l1-SVM) classifier. In our approach, we project the SIP messages into a very high dimensional space using string based n-gram features. Hence, a linear classifier is trained on the top of these features. Our experimental results show that the proposed system detects malformed message, invite flooding, and SPIT attacks with a high accuracy. In addition, the proposed system outperformed other systems significantly in the detection speed.


Author(s):  
Elmostafa Belmekki ◽  
Raouyane Brahim ◽  
Abdelhamid Belmekki ◽  
Mostafa Bellafkih

IMS is a standardized service architecture defined by 3GPP, ETSI, and IETF to provide multimedia services such as videoconferencing, VoD, and voice over IP. IMS is mainly based on the SIP protocol for session initialization. The convergence to full IP has advantages but also disadvantages. The latter are mainly inherited from the weaknesses of the IP protocol, in particular the QoS and the security aspects. It is in this context that this chapter is written. It has as main objective to analyze security in IMS networks as service layer in 4G to identify the most vulnerable points and propose security solutions that can be implemented without degrading the QoS.


Sign in / Sign up

Export Citation Format

Share Document