Using end-to-end data encryption to secure SIP device configuration

Chen, Xudong and Fan, Wenjun (2013). Using end-to-end data encryption to secure SIP device configuration. In: "2013 IEEE International Conference on Granular Computing (GrC)", 13-15 Dec. 2013. pp. 58-63. https://doi.org/10.1109/GrC.2013.6740381.

Description

Title: Using end-to-end data encryption to secure SIP device configuration
Author/s:
  • Chen, Xudong
  • Fan, Wenjun
Item Type: Presentation at Congress or Conference (Article)
Event Title: 2013 IEEE International Conference on Granular Computing (GrC)
Event Dates: 13-15 Dec. 2013
Title of Book: 2013 IEEE International Conference on Granular Computing (GrC)
Date: 13 December 2013
Subjects:
Freetext Keywords: authorisation;client-server systems;computer network security;cryptography;internetworking;transport protocols;virtual private networks;FastCGI programming;HTTP server attack protection;ISP;SIP device configuration;SIP device configuration security;TFTP protocol;application gateway;authentic clients;authorization;configuration file transmission;data sharing;end-to-end data encryption;end-to-end security;free-end-to-end security scheme;network transmission;symmetrical file encryption approach;third-party enterprise certificate;transmission process security;virtual private tunnel;Encryption;IP networks;Logic gates;Web servers;Application Gateway;End-to-End security;FastCGI;SIP Device Configuration
Faculty: E.T.S.I. Telecomunicación (UPM)
Department: Ingeniería de Sistemas Telemáticos [hasta 2014]
Creative Commons Licenses: Recognition

Full text

[img]
Preview
PDF - Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (777kB) | Preview

Abstract

Security between the endpoints is an important requirement for network transmission. One existing solution of End-to-End security is based on the certificate of the third-party enterprise such as the authorization from ISP. And the other methods usually established a virtual private tunnel between the two endpoints. Considering the SIP device configuration basically used tftp protocol to transmit the configuration file, we proposed a free End-to-End security scheme using Application Gateway and data encryption to secure this transmission process. In this paper, Application Gateway used FastCGI programming to protect the HTTP server from attacking. On the other hand, the file encryption approach applied symmetrical encryption to ensure that only the authentic client could share the data from the server.

More information

Item ID: 45397
DC Identifier: http://oa.upm.es/45397/
OAI Identifier: oai:oa.upm.es:45397
DOI: 10.1109/GrC.2013.6740381
Deposited by: Wenjun Fan
Deposited on: 03 Apr 2017 09:59
Last Modified: 03 Apr 2017 09:59
  • Logo InvestigaM (UPM)
  • Logo GEOUP4
  • Logo Open Access
  • Open Access
  • Logo Sherpa/Romeo
    Check whether the anglo-saxon journal in which you have published an article allows you to also publish it under open access.
  • Logo Dulcinea
    Check whether the spanish journal in which you have published an article allows you to also publish it under open access.
  • Logo de Recolecta
  • Logo del Observatorio I+D+i UPM
  • Logo de OpenCourseWare UPM