Wiley Encyclopedia of Telecommunications 2003
DOI: 10.1002/0471219282.eot251
|View full text |Cite
|
Sign up to set email alerts
|

Session Initiation Protocol (SIP)

Abstract: Status of this MemoThis memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2004
2004
2019
2019

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 68 publications
(6 citation statements)
references
References 44 publications
(8 reference statements)
0
6
0
Order By: Relevance
“…This is consistent with 3GPP and TISPAN specifications [9] on signaling to provide receiver or end user device capabilities. Hence in a real network, the initial device registration (using for example SIP -Session Initiation Protocol [10]) would contain an SDP (Session Description Protocol [11]) from which the appropriate NC strategy could be deducted.…”
Section: Modelingmentioning
confidence: 99%
“…This is consistent with 3GPP and TISPAN specifications [9] on signaling to provide receiver or end user device capabilities. Hence in a real network, the initial device registration (using for example SIP -Session Initiation Protocol [10]) would contain an SDP (Session Description Protocol [11]) from which the appropriate NC strategy could be deducted.…”
Section: Modelingmentioning
confidence: 99%
“…a SIP-URI [16]) which might be assigned to a DNS name. Whenever a peer wants to establish a connection to a service it queries the DNS for the URI and sends the signaling messages to it.…”
Section: A Ants Request Response Protocolmentioning
confidence: 99%
“…[9] During a testing process [2] carried out by us, we have discovered a scenario in which the user is reachable by the attacker and the latest can trigger the former to generate an INVITE + credentials 1 (directed to any target destination). This allows an attacker to impersonate the user at the Proxy for any call.…”
Section: Sip Vulnerabilitymentioning
confidence: 99%
“…The Contact header has to provide the destination that the attacker wants to call to, because, as specified by SIP [9] this information will be used to generate the message by the user agent.…”
Section: Sip Vulnerabilitymentioning
confidence: 99%