DOI QR코드

DOI QR Code

VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구

A Study on the Secure Authentication Method using SIP in the VoIP System

  • 투고 : 2010.12.02
  • 심사 : 2011.02.01
  • 발행 : 2011.03.30

초록

VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

키워드

참고문헌

  1. 양호경, 차현종, 한인성, 유황빈, "VoIP 서비스 환경에서의 사용자 접근 통제 및 인증 시스템", 한국컴퓨터종합학술대회 논문집, Vol. 32, No. 1, 2007.
  2. 한국정보보호진흥원, "VoIP 정보보호기술 개발", 지식경재부, 2009.
  3. 진현철, 김정미, 김종근, "VoIP 서비스의 사용자 인증 기법", 정보과학회논문지, VOL. 15, No. 8, 2009.
  4. 송유진, 이재용, "SIP-VoIP 보안 인증 모델", 한국엔터테인먼트산업학회논문지, 제3권, 제3호, 2009.
  5. Ram Dantu, Prakash Kolan "Detecting Spam in VoIP Networks," SRUTI'05, 2005.
  6. 윤하나, 이형우, "SIP 공격 대응을 위한 보안성이 강화된 Stateful SIP 프로토콜", 한국콘텐츠학회논문지, 제10권, 1호, 2010.
  7. http://www.voip-forum.or.kr, VoIP 국내표준, "SIP 기반 인터넷 텔레포니 단말", 2005.
  8. 윤성열, 박석천, "인증 서비스 제공 망에서 VoIP 서비스의 사용자 인증 기법 연구", 한국인터넷정보학회 학술대회 논문집, 제9권, 1호, 2008.
  9. Yacine Rebahi, Dorgham Sisalem and Thomas MageDanz, "SIP SPAM Detection," ICDT 2006, August, 2006, p. 68.
  10. T. Dierks, C. Allen, "The TLS Protocol Version 1.0," RFC 2246. January, 1999.
  11. T. Dierks, C. AlIen "The TLS Protocol Version 1.0", IETF RFC 2246, January, 1999.
  12. J. Fenton, "Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)," IETF RFC 4686, September, 2006.