Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table

IP phones have benefited greatly from the ever-increasing capabilities of computer hardware in general, including faster microprocessors, larger memory capacity, and greater network bandwidth. A single IP phone shipping in 2010 has far more computing capacity than most of the early PBXs. This tre...

Full description

Saved in:
Bibliographic Details
Main Author: Jaber, Aws Naser
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://eprints.usm.my/43244/1/Aws%20Naser%20Jaber24.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-usm-ep.43244
record_format uketd_dc
spelling my-usm-ep.432442019-04-12T05:26:16Z Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table 2013-05 Jaber, Aws Naser QA75.5-76.95 Electronic computers. Computer science IP phones have benefited greatly from the ever-increasing capabilities of computer hardware in general, including faster microprocessors, larger memory capacity, and greater network bandwidth. A single IP phone shipping in 2010 has far more computing capacity than most of the early PBXs. This trend will only continue. IP phones are adding color displays with full-blown Web browsers. Some are adding embedded Warning Do not forget to investigate how data is stored on a local system or any intermediary system. If, for instance, all log files of IM chat sessions are stored in clear, unencrypted text on a local computer where multiple people have access to the computer, the fact that the IM client encrypts sessions between the computers and the server does not fully protect those sessions. The session transcripts could still be read locally by anyone with access to the local computer. Today, while many companies might still choose to buy from a single vendor for the sake of convenience, the reality is that in the era of interoperable protocol standards like Session Initiation Protocol (SIP), the companies are no longer required to buy from the same vendor. The session initiation protocol (SIP) has recently become the main signaling protocol for Internet applications. The wide range of SIP services raises many concerns on SIP security. Thus, the most popular SIP authentication schemes were studied in this paper. The previous cryptographic scheme known as Yoon’s scheme proposes SIP authentication that brings efficiency in security but is costly in terms of time. 2013-05 Thesis http://eprints.usm.my/43244/ http://eprints.usm.my/43244/1/Aws%20Naser%20Jaber24.pdf application/pdf en public masters Universiti Sains Malaysia Pusat Pengajian Sains Komputer
institution Universiti Sains Malaysia
collection USM Institutional Repository
language English
topic QA75.5-76.95 Electronic computers
Computer science
spellingShingle QA75.5-76.95 Electronic computers
Computer science
Jaber, Aws Naser
Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
description IP phones have benefited greatly from the ever-increasing capabilities of computer hardware in general, including faster microprocessors, larger memory capacity, and greater network bandwidth. A single IP phone shipping in 2010 has far more computing capacity than most of the early PBXs. This trend will only continue. IP phones are adding color displays with full-blown Web browsers. Some are adding embedded Warning Do not forget to investigate how data is stored on a local system or any intermediary system. If, for instance, all log files of IM chat sessions are stored in clear, unencrypted text on a local computer where multiple people have access to the computer, the fact that the IM client encrypts sessions between the computers and the server does not fully protect those sessions. The session transcripts could still be read locally by anyone with access to the local computer. Today, while many companies might still choose to buy from a single vendor for the sake of convenience, the reality is that in the era of interoperable protocol standards like Session Initiation Protocol (SIP), the companies are no longer required to buy from the same vendor. The session initiation protocol (SIP) has recently become the main signaling protocol for Internet applications. The wide range of SIP services raises many concerns on SIP security. Thus, the most popular SIP authentication schemes were studied in this paper. The previous cryptographic scheme known as Yoon’s scheme proposes SIP authentication that brings efficiency in security but is costly in terms of time.
format Thesis
qualification_level Master's degree
author Jaber, Aws Naser
author_facet Jaber, Aws Naser
author_sort Jaber, Aws Naser
title Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
title_short Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
title_full Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
title_fullStr Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
title_full_unstemmed Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
title_sort improving the efficiency of sip authentication based on the pre-calculated look-up table
granting_institution Universiti Sains Malaysia
granting_department Pusat Pengajian Sains Komputer
publishDate 2013
url http://eprints.usm.my/43244/1/Aws%20Naser%20Jaber24.pdf
_version_ 1747821185869021184