The Authentication and Processing Performance of Session Initiation Protocol (SIP) Based Multi-party Secure Closed Conference System



Similar documents
Session Initiation Protocol

User authentication in SIP

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Request for Comments: August 2006

NAT TCP SIP ALG Support

SIP: Protocol Overview

Media Gateway Controller RTP

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW

SIP: Ringing Timer Support for INVITE Client Transaction

(Refer Slide Time: 6:17)

This specification this document to get an official version of this User Network Interface Specification

SIP Trunking Manual. For Samsung OfficeServ. Sep 18, 2006 doc v Sungwoo Lee Senior Engineer

End Device Support for AAA in SIP Conferencing

Radius/LDAP authentication in open-source IP PBX

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 TEL: # 340

Session Initiation Protocol (SIP)

SIP : Session Initiation Protocol

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

A Comparative Study of Signalling Protocols Used In VoIP

SIP Session Initiation Protocol Nicolas Montavont

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

SIP A Technology Deep Dive

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack

Session Initiation Protocol Security Considerations

WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services

Enterprise Video Conferencing

SIP Trunking & Peering Operation Guide

SIP: Ringing Timer Support for INVITE Client Transaction

How To Interwork On An Ip Network

VIDEOCONFERENCING. Video class

SIP Trunking Manual Technical Support Web Site: (registration is required)

Three-Way Calling using the Conferencing-URI

Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem

For internal circulation of BSNL only

Overview of VoIP Systems

Prevention of Anomalous SIP Messages

NAT and Firewall Traversal. VoIP and MultiMedia /77

Special Module on Media Processing and Communication

Efficient Nonce-based Authentication Scheme for. session initiation protocol

Two-Stage Forking for SIP-based VoIP Services

TSIN02 - Internetworking

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

IMS Conference (IMS Conference Call) Calling UE IMS Network Called UE Caller User Equipment

Best Practices for SIP Security

A Phased Framework for Countering VoIP SPAM

An Evaluation of Architectures for IMS Based Video Conferencing

Sangheon Pack, EunKyoung Paik, and Yanghee Choi

TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series

An Efficient Server Load Balancing using Session Management

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information

Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol

1. Scope and objectives

Session Initiation Protocol and Services

SIP Conferencing. Audio/video tools + protocols for A/V over IP Conference announcement and control protocols. Audio + video (+ sometimes slides)

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

SIP and Mobility: IP Multimedia Subsystem in 3G Release 5

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

How To Send A Connection From A Proxy To A User Agent Server On A Web Browser On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Webmail Web Browser (For Ipad) On An Ipad Or

Integrating a Hitachi IP5000 Wireless IP Phone

SIP and ENUM. Overview DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP

EE4607 Session Initiation Protocol

TECHNICAL CHALLENGES OF VoIP BYPASS

SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, Dennis Baron, January 5, 2005 Page 1. np119

IxLoad: Advanced VoIP

Session Initiation Protocol Attacks and Challenges

2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing

New possibilities for the provision of value-added services in SIP-based peer-to-peer networks

How To Attack A Phone With A Billing Attack On A Sip Phone On A Cell Phone On An At&T Vpn Vpn Phone On Vnet.Com (Vnet) On A Pnet Vnet Vip (Sip)

Architecture of End-to-End QoS for VoIP Call Processing in the MPLS Network

10 Signaling Protocols for Multimedia Communication

7 SIP (II) Call flow for basic call scenario In the case of registration and finding the SIP user Collecting the bill Multiparty conferencing with SIP

Session Initiation Protocol (SIP)

Formación en Tecnologías Avanzadas

SIP Station Manual. For Samsung OfficeServ. Nov 23, 2007 doc v1.11

ETSI TS V6.8.0 ( ) Technical Specification

Efficient nonce-based authentication scheme for Session Initiation Protocol

SIP Trunking. Service Guide. Learn More: Call us at

Introduction to VoIP Technology

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Technical Means to Combat Spam in the VoIP Service

SIP: Session Initiation Protocol. Copyright by Elliot Eichen. All rights reserved.

VoIP Secure Communication Protocol satisfying Backward Compatibility 1

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE Version 1

Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users 1

SIP Introduction. Jan Janak

Programming SIP Services University Infoline Service

Chapter 2 PSTN and VoIP Services Context

A Comparison of H.323 vs SIP

CommuniGate Pro Real-Time Features. CommuniGate Pro Internet Communications VoIP, , Collaboration, IM

SIP, Session Initiation Protocol used in VoIP

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic

The Design of the Network Service Access Control System through Address Control in IPv6 Environments

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking

Basic Vulnerability Issues for SIP Security

SIP Messages. 180 Ringing The UA receiving the INVITE is trying to alert the user. This response MAY be used to initiate local ringback.

Identity based Authentication in Session Initiation. Session Initiation Protocol

Denial of Services on SIP VoIP infrastructures

Transcription:

The Authentication and Processing Performance of Session Initiation Protocol () Based Multi-party Secure Closed Conference System Jongkyung Kim 1, Hyuncheol Kim 1, Seongjin Ahn 2, and Jinwook Chung 1 1 Department of Computer Engineering, Sungkyunkwan University, Suwon, Korea {jongkkim,hckim,jwchung}@songgang.skku.ac.kr 2 Department of Computer Education, Sungkyunkwan University, Seoul, Korea sjahn@comedu.skku.ac.kr Abstract. This paper presents, a new based multi-party secure closed conference system. In the traditional participants, except of captain, conference system doesn t have a privilege for UA (User Agent) that accepts or declines new participants. On the other hand, closed conference system supports this function. We also propose for closed conference system authentication procedure. By means of a real implementation, we provide an experimental performance analysis of security mechanisms. 1 Introduction The system configuration for multi-party based conference (including 3 parties or over) can be largely classified into three models. As shown in Fig. 1(a), an end user system should cover all the signaling and media mixing during the conference, resulting in a significant overload on the system. In the case of distributed multipoint conference model, as shown in Fig. 1(b), an additional terminal leads to an increase in multicast recipient. This means that an additional INVITE message is inefficiently required whenever such process is repeated. Finally, Ad-hoc conference model adopts a simple structure where the central media server or MCU (Multipoint Control Unit) processes all the signaling messages and performs media mixing so that each end user manages only his own traffics [1][2]. The message contains information that a user or server wishes to keep private. Securing header and body information can be motivated by two reasons. One is that we need maintain private user and network information in order to guarantee a certain level of privacy. Another is that we have to avoid sessions being set up or changed by attackers faking the identity of someone else. The UAC (User Agent Client), calling side, can identity itself to a UAS (User Agent Server), called side. Therefore, authentication applies only to user-to-user, user-proxy or user-registrar communication [3] A representation of the digest authentication procedure is given in Fig. 2. The function F() used to compute the response specifies how to combine the input pa- J. Cao et al. (Eds.): ISPA 2004, LNCS 3358, pp. 725 729, 2004. Springer-Verlag Berlin Heidelberg 2004

726 J. Kim et al. rameter with some iterations of a digest algorithm [4][5]. The authentication procedure is run when the UAS, a proxy server, or the registrar server requires the calling side (UAC) to be authenticated before accepting the call, forwarding the call, or accepting the registration. UA UA UA MCP(Multipoint Control Unit) Conference Bridge + Bridge UA UA UA (a) End user conference model (b) Distributed Multipoint conference model UA UA MCP(Multipoint Control Unit) Conference Bridge + Bridge UA (c) Ad-Hoc conference model Fig. 1. Configuration for -Based Multi-Party Conference System REQUEST CHALLENGE Generate the nonce value nonce, realm Compute response = F(nonce, username, password, realm) REQUEST nonce, realm, username, response Authentication compute F(nonce, username, password, realm) and it compare response Fig. 2. The Procedure of Digest Authentication In case of the existing conference system, as shown above, only the captain of conference has the right of invitation of additional participants. However, closed conference system needs all participants anonymous agreement is needed to invite additional participants. In this paper, the closed conference model and the extended header will be proposed. The reminders of this paper are organized as follows. The authentication procedure for closed conference system is proposed in section 2. The section 3 describes the methodology for the evaluation of processing cost and experimental results. Finally, we make a conclusion.

The Authentication and Processing Performance of Session Initiation Protocol 727 2 Proposed Authentication Procedure for Closed Conference System The simple expansion of 1:1 connection isn t able to guarantee satisfactory confidence. For instance, when a new participant joins conference session, existing participants and new one have to know the information of who has joined conference. That is why any one among them doesn t want to join conference together. Therefore, we need to know all participants of conference. We use the method that is the usage of INVITE message s SDP (Session Description Protocol) from the conference server [6]. Fig. 3 shows the procedure of the invitation of a participant in the closed conference system. To begin with Alice and Bob setup call session through authentication procedure. When the captain, Bob, invites Carol, Bob s UA sends NOTIFY message to Alice in order to agree an additional invitation. When Alice agrees to invite Carol, UA sends 200 OK message (F25). However, when he doesn t want to do that, it sends 603 declined message (F25). If Alice agrees the invitation of Carol, next time, Conference Server asks Bob to join conference. Bob checks the received information of participants. If he doesn t want to join that conference, he sends 603 messages (F43). This procedure presents with gray box in Fig. 3. The states of the proposed UA can be divided into StateIdle (initial state), StateTrying, StateRinging, and StateInCall. The initial state is changed to StateRinging state when a phone is answered and followed by a receipt of ringing message, as shown in Fig. 4. When a ring is given someone, INVITE message is sent so that the status is set at StateTrying state. In the case of conference during the process, the REFER message is sent. If an INVITE message is received during StateIdle state, a negotiation of multimedia to be used in the session is followed by sending Ringing OK message (Real message: 180 Ringing). After that, it is changed to StateRinging state. At that time, if network resources are lacking or the phone is on the line, a receipt of PRACK message during StateRinging state results in sending 200 OK and INVITE OK(200) messages. After that, it is changed to StateInCall state. 3 Methodology for the Evaluation of Processing Cost and Experimental Results In order to experiment with advanced feature in, we have realized a test bed [7]. The goal of this test bed was twofold: firstly verification of the function behavior of the various elements and their interoperability; secondly the possibility of making some performance analysis. In particular regarding performance analysis, an interesting point is the evaluation of the cost to be paid in terms of performance for in the introduction of security mechanisms. The results of our evaluation are reported in Table 1. The Third column reports the experiential average cost of twenty times in terms of second. Note that this throughput corresponds to 100 percent utilization of elements processing resources. The two rightmost columns are the most important ones and report the throughput value converted in a relative processing cost.

728 J. Kim et al. The result show that the introduction of security accounts for nearly 30 percent of processing cost of no authentication procedure. This increase can be explained with the increase in number of exchanged messages. Another interesting finding is that the incensement of processing time cost increase accidentally, when third attendant joins conference. Carol Bob Alice Conference Server Server INVITE F1 407 Proxy Authentication F2 ACK F3 INVITE F4 180 Ringing F5 200 OK F6 ACK F7 BYE F8 200 OK F9 INVITE (SDP Bob) F10 407 Proxy Authentication F11 ACK F12 INVITE F13 180 Ringing F14 INVITE (SDP Bob) F15 200 OK (SDP MS) F16 ACK F17 200 OK Contact:conf-id (SDP MS) F18 ACK F19 SUBCRIBE sip:conf-id F20 200 OK F21 NOTIFY F22 200 OK F23 NOTIFY F24 200 OK / 603 Decline F25 REFER sip:conf-id Refer-To: Alice F26 202 Accepted F27 INVITE Contact:conf-id:isfocus(no SDP) F28 180 Ringing / 200 OK(SDP Alice) F29 INVITE (SDP Alice) F30 200 OK (SDP MS) F31 ACK F32 ACK(SDP MS) F33 SUBSCRIBE sip:conf-id F34 200 OK F35 NOTIFY F36 200 OK F37 NOTIFY F38 200 OK F39 REFER sip:conf-id Refer-To:Carol F40 202 Accepted F41 INVITE Contact:conf-id:isfocus(particaint information SDP) F42 603 Decline F43 NOTIFY(Information of decline) F44 200 OK F45 Tx : Ringing OK ( StateRinging ) ( Tx : BUSY Tx : INVITE OK ( StateIdle ) Tx /Rx: BYE Tx : CANCEL Tx : INVITE, REFER ( StateTrying ) ( StateInCall ) Rx: INVITE OK Fig. 3. The Procedure of Closed Conference System Fig. 4. Proposed UA State Transition Diagram UA3 Flow UA2 Server Flow UA4 Conference Server UA1 UA5 WAN UA6 Proxy / Registrar Proxy / Registrar Fig. 5. The Test Bed Layout

The Authentication and Processing Performance of Session Initiation Protocol 729 Table 1. Experimental results Procedure/scenario Processing time cost(second) Relative cost 1 No authentication, 2 attendants 2.873 * 10^-2 100 2 No authentication, 3 attendants 4.022 * 10^-2 140 3 No authentication, 4 attendants 4.252 * 10^-2 148 4 No authentication, 5 attendants 4.453 * 10^-2 155 5 No authentication, 6 attendants 4.683 * 10^-2 163 6 Authentication, 2 attendants 3.735 * 10^-2 130 7 Authentication, 3 attendants 5.200 * 10^-2 181 8 Authentication, 4 attendants 5.545 * 10^-2 193 9 Authentication, 5 attendants 5.746 * 10^-2 200 10 Authentication, 6 attendants 6.119 * 10^-2 213 4 Conclusion In this study, based multi-party closed conference system and authentication procedure is described. The performance aspects of authentication for closed conference system are considered with pure experimental approach. The processing costs of different security procedure/scenario are compared under a reference implementation. Although the performance results are obviously conditioned by the specific implementation aspects, they can be rough idea of relative processing cost of security procedures. References [1] Jonathan Rosenberg, et al.: Models for Multi Party Conferencing in, Jan. 2003 [2] A. Johnson: Call Control-Conferencing for User Agents, Oct. 2003 [3] Rohan Mahy: A Call Control and Multi-party usage Framework for the Session Initiation Protocol (), September 2003 [4] J, Franks et al.: HTTP Authentication: Basic and Digest Access Authentication, IETF RFC 2617, June 1999 [5] R. Rivest: The MD5 Message-digest Algorithm, IETF RFC 1321, Apr 1992 [6] Janet R. Dianda, et al.:, Bell Labs Technical Journal 7(1), 3-23(2002) [7] Guy J. Zenner, Mark H.Jones, Amit A. Patel: Emerging Uses of in Service Provider Networks, Bell Labs Technical Journal 8(1), 43-63(2003)