{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T18:42:15Z","timestamp":1699900935489},"reference-count":33,"publisher":"Wiley","issue":"8","license":[{"start":{"date-parts":[[2009,5,5]],"date-time":"2009-05-05T00:00:00Z","timestamp":1241481600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2009,8]]},"abstract":"Abstract<\/jats:title>The deployment of multimedia over IP (MoIP), and in particular voice over IP services, requires to solve new security issues they introduce, before completely exploiting the great opportunities they offer to telecommunication market. Furthermore, the implementation of various security measures can cause a marked deterioration in quality of service, which is fundamental to the operation of an MoIP network that meets users' quality expectations. In particular, because of the time\u2010critical nature of MoIP and its low tolerance for disruption and packet loss, many security measures implemented in traditional data networks are simply not applicable in their current form. This paper presents an analysis of the security options of Session Initiation Protocol\u2010 (SIP)\u2010based MoIP architecture aimed at evaluating their impact on delay. In particular, each security option is analyzed in terms of clock cycles needed to perform the related operations. This parameter could be used to estimate the delay introduced by the security mechanisms. Moreover the paper proposes a rigorous definition of five security profiles, which provide different levels of security to a MoIP system. Copyright \u00a9 2009 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/dac.1018","type":"journal-article","created":{"date-parts":[[2009,5,5]],"date-time":"2009-05-05T08:08:22Z","timestamp":1241510902000},"page":"1023-1044","source":"Crossref","is-referenced-by-count":13,"title":["Security and delay issues in SIP systems"],"prefix":"10.1002","volume":"22","author":[{"given":"Christian","family":"Callegari","sequence":"first","affiliation":[]},{"given":"Rosario G.","family":"Garroppo","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Giordano","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Pagano","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2009,7,20]]},"reference":[{"key":"e_1_2_1_2_2","unstructured":"X.800 security architecture for OSI. ITU\u2010T 1991."},{"key":"e_1_2_1_3_2","unstructured":"ShireyR.RFC2828: Internet security glossary. IETF Network Working Group May2000."},{"key":"e_1_2_1_4_2","unstructured":"RosenbergJ.et al.RFC3261: SIP: session initiation protocol. IETF Network Working Group June2002."},{"key":"e_1_2_1_5_2","doi-asserted-by":"crossref","unstructured":"FranksJ.et al.RFC2617: HTTP authentication: basic and digest access authentication. IETF Network Working Group June1999.","DOI":"10.17487\/rfc2617"},{"key":"e_1_2_1_6_2","doi-asserted-by":"crossref","unstructured":"DierksT RescorlaE.RFC 4346 the transport layer security (TLS) protocol version 1.1. IETF Network Working Group April2006.","DOI":"10.17487\/rfc4346"},{"key":"e_1_2_1_7_2","doi-asserted-by":"crossref","unstructured":"RamsdellB.RFC3850: secure\/multipurpose Internet mail extensions (S\/MIME) version 3.1\u2014certificate handling. IETF Network Working Group July2004.","DOI":"10.17487\/rfc3850"},{"key":"e_1_2_1_8_2","unstructured":"RamsdellB.RFC3851: S\/MIME version 3.1 message specification. IETF Network Working Group July2004."},{"key":"e_1_2_1_9_2","unstructured":"KentS AtkinsonR.RFC2401: security architecture for the Internet protocol. IETF Network Working Group November1998."},{"key":"e_1_2_1_10_2","doi-asserted-by":"crossref","unstructured":"KentS AtkinsonR.RFC2402: IP authentication header. IETF Network Working Group November1998.","DOI":"10.17487\/rfc2402"},{"key":"e_1_2_1_11_2","doi-asserted-by":"crossref","unstructured":"KentS AtkinsonR.RFC2406: IP encapsulating security payload (ESP). IETF Network Working Group November1998.","DOI":"10.17487\/rfc2406"},{"key":"e_1_2_1_12_2","doi-asserted-by":"crossref","unstructured":"HarkinsD CarrelD.RFC2409: the Internet key exchange (IKE). IETF Network Working Group November1998.","DOI":"10.17487\/rfc2409"},{"key":"e_1_2_1_13_2","doi-asserted-by":"crossref","unstructured":"BaugherM.et al.RFC 3711: the secure real\u2010time transport protocol (SRTP). IETF Network Working Group March2004.","DOI":"10.17487\/rfc3711"},{"key":"e_1_2_1_14_2","doi-asserted-by":"crossref","unstructured":"AndreasenF BaugherM WingD.RFC4568: session description protocol (SDP) security descriptions for media streams. IETF Network Working Group July2006.","DOI":"10.17487\/rfc4568"},{"key":"e_1_2_1_15_2","doi-asserted-by":"crossref","unstructured":"ArkkoJ.et al.RFC4567: key management extensions for session description protocol (SDP) and real time streaming protocol (RTSP). IETF Network Working Group July2006.","DOI":"10.17487\/rfc4567"},{"key":"e_1_2_1_16_2","doi-asserted-by":"crossref","unstructured":"RescorlaE ModaduguN.RFC 4347\u2014datagram transport layer security. IETF Network Working Group April2006.","DOI":"10.17487\/rfc4347"},{"key":"e_1_2_1_17_2","unstructured":"McGrewD RescorlaE.Datagram transport layer security (DTLS) extension to establish keys for secure real\u2010time transport protocol (SRTP). IETF Network Working Group October2008."},{"key":"e_1_2_1_18_2","unstructured":"RTPSEC Minutes: IETF 68.IETF Network Working Group March 2007. Available online at:http:\/\/www.ietf.org\/proceedings\/07mar\/minutes\/rtpsec.txt[accessed on 23\/01\/09]."},{"key":"e_1_2_1_19_2","doi-asserted-by":"crossref","unstructured":"ArkkoJ.et al.RFC3830: MIKEY: Multimedia Internet KEYing. IETF Network Working Group August2004.","DOI":"10.17487\/rfc3830"},{"key":"e_1_2_1_20_2","unstructured":"ZimmermannP JohnstonA CallasJ.ZRTP: media path key agreement for secure RTP. IETF Network Working Group March2006."},{"key":"e_1_2_1_21_2","doi-asserted-by":"crossref","unstructured":"PetersonJ JenningsC.RFC4474: enhancements for authenticated identity management in the session initiation protocol (SIP). IETF Network Working Group August2006.","DOI":"10.17487\/rfc4474"},{"key":"e_1_2_1_22_2","doi-asserted-by":"crossref","unstructured":"PetersonJ.RFC3893: session initiation protocol (SIP) authenticated identity body (AIB) Format. IETF Network Working Group September2004.","DOI":"10.17487\/rfc3893"},{"key":"e_1_2_1_23_2","unstructured":"XieH ZhouL.Architectural analysis of cryptographic applications for network processors. IEEE First Workshop on Network Processors Boston February 2002."},{"key":"e_1_2_1_24_2","doi-asserted-by":"crossref","unstructured":"ApostolopoulosG PerisVGJ SahaD.Transport layer security: how much does it really cost?INFOCOM 1999 New York NY March1999.","DOI":"10.1109\/INFCOM.1999.751458"},{"key":"e_1_2_1_25_2","unstructured":"CoarfaC DruschelP WallachDS.Performance analysis of TLS Web servers. ISOC NDSS San Diego CA February2002."},{"key":"e_1_2_1_26_2","doi-asserted-by":"crossref","unstructured":"LinX WongJW KouW.Performance analysis of secure Web server based on SSL. ISW 2000 Wollongong NSW Australia January2000.","DOI":"10.1007\/3-540-44456-4_19"},{"key":"e_1_2_1_27_2","unstructured":"AlshamsiA SaitoT.A technical comparison of IPSec and SSL. AINA 2005 Taiwan 2005."},{"key":"e_1_2_1_28_2","unstructured":"BagS.Performance impact of security protocols. Bachelor Thesis IIT Bombay 2003."},{"key":"e_1_2_1_29_2","unstructured":"MainkarV.Performance implications of security protocols. Fifth INFORMS Telecom Conference San Antonio TX March 2000."},{"key":"e_1_2_1_30_2","unstructured":"SpringerB KilmartinL.Performance of the Internet key exchange protocol for securing VoIP networks. Irish Post\u2010graduate Telecommunications Symposium 2003 Dublin October 2003."},{"key":"e_1_2_1_31_2","doi-asserted-by":"crossref","unstructured":"KaufmanC.RFC4306: Internet key exchange (IKEv2) protocol. IETF Network Working Group December2005.","DOI":"10.17487\/rfc4306"},{"key":"e_1_2_1_32_2","doi-asserted-by":"crossref","unstructured":"RescorlaE.RFC2631: Diffie\u2013Hellman key agreement method. IETF Network Working Group June1999.","DOI":"10.17487\/rfc2631"},{"key":"e_1_2_1_33_2","volume-title":"Queueing Systems, Volume 1: Theory","author":"Kleinrock L","year":"1975"},{"key":"e_1_2_1_34_2","unstructured":"Threat Taxonomy Working Groups.VoIP security and privacy threat taxonomy. VoIPSA October2005."}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.1018","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.1018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T18:10:46Z","timestamp":1699899046000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.1018"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,20]]},"references-count":33,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2009,8]]}},"alternative-id":["10.1002\/dac.1018"],"URL":"https:\/\/doi.org\/10.1002\/dac.1018","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,20]]}}}