Using end-to-end data encryption to secure SIP device configuration

Chen, Xudong y Fan, Wenjun (2013). Using end-to-end data encryption to secure SIP device configuration. En: "2013 IEEE International Conference on Granular Computing (GrC)", 13-15 Dec. 2013. pp. 58-63. https://doi.org/10.1109/GrC.2013.6740381.

Descripción

Título: Using end-to-end data encryption to secure SIP device configuration
Autor/es:
  • Chen, Xudong
  • Fan, Wenjun
Tipo de Documento: Ponencia en Congreso o Jornada (Artículo)
Título del Evento: 2013 IEEE International Conference on Granular Computing (GrC)
Fechas del Evento: 13-15 Dec. 2013
Título del Libro: 2013 IEEE International Conference on Granular Computing (GrC)
Fecha: 13 Diciembre 2013
Materias:
Palabras Clave Informales: authorisation;client-server systems;computer network security;cryptography;internetworking;transport protocols;virtual private networks;FastCGI programming;HTTP server attack protection;ISP;SIP device configuration;SIP device configuration security;TFTP protocol;application gateway;authentic clients;authorization;configuration file transmission;data sharing;end-to-end data encryption;end-to-end security;free-end-to-end security scheme;network transmission;symmetrical file encryption approach;third-party enterprise certificate;transmission process security;virtual private tunnel;Encryption;IP networks;Logic gates;Web servers;Application Gateway;End-to-End security;FastCGI;SIP Device Configuration
Escuela: E.T.S.I. Telecomunicación (UPM)
Departamento: Ingeniería de Sistemas Telemáticos [hasta 2014]
Licencias Creative Commons: Reconocimiento

Texto completo

[img]
Vista Previa
PDF (Document Portable Format) - Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (777kB) | Vista Previa

Resumen

Security between the endpoints is an important requirement for network transmission. One existing solution of End-to-End security is based on the certificate of the third-party enterprise such as the authorization from ISP. And the other methods usually established a virtual private tunnel between the two endpoints. Considering the SIP device configuration basically used tftp protocol to transmit the configuration file, we proposed a free End-to-End security scheme using Application Gateway and data encryption to secure this transmission process. In this paper, Application Gateway used FastCGI programming to protect the HTTP server from attacking. On the other hand, the file encryption approach applied symmetrical encryption to ensure that only the authentic client could share the data from the server.

Más información

ID de Registro: 45397
Identificador DC: http://oa.upm.es/45397/
Identificador OAI: oai:oa.upm.es:45397
Identificador DOI [BETA]: 10.1109/GrC.2013.6740381
Depositado por: Wenjun Fan
Depositado el: 03 Abr 2017 09:59
Ultima Modificación: 03 Abr 2017 09:59
  • Open Access
  • Open Access
  • Sherpa-Romeo
    Compruebe si la revista anglosajona en la que ha publicado un artículo permite también su publicación en abierto.
  • Dulcinea
    Compruebe si la revista española en la que ha publicado un artículo permite también su publicación en abierto.
  • Recolecta
  • e-ciencia
  • Observatorio I+D+i UPM
  • OpenCourseWare UPM