[1]蒋华[][],杨磊[] 胡荣磊[]. 基于SIP协议的安全网关设计[J].计算机技术与发展,2015,25(07):120-123.
 JIANG Hua[][],YANG Lei[],HU Rong-lei[]. Design of Security Gateway Based on SIP[J].,2015,25(07):120-123.
点击复制

 基于SIP协议的安全网关设计()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年07期
页码:
120-123
栏目:
安全与防范
出版日期:
2015-07-10

文章信息/Info

Title:
 Design of Security Gateway Based on SIP
文章编号:
1673-629X(2015)07-0120-04
作者:
 蒋华[1][2] 杨磊[1] 胡荣磊[2]
 1.西安电子科技大学;2. 北京电子科技学院
Author(s):
 JIANG Hua[1][2] YANG Lei[1] HU Rong-lei[2]
关键词:
 会话传输协议SIP代理服务器椭圆曲线自证明公钥密码算法安全网关
Keywords:
 SIPSIP-proxy serverECCself-certified public key cryptographic algorithmsecurity gateway
分类号:
TP302.1
文献标志码:
A
摘要:
 SIP(会话传输协议)是基于文本的传输协议,信令发起简单,使用方便,是下一代通信网的核心协议之一,近年来得到了很大的应用。然而由于SIP协议的设计之初没有考虑到安全性问题,导致SIP协议在应用中很容易受到安全威胁。所以文中针对SIP协议面临的安全威胁进行研究,结合基于椭圆曲线的自证明公钥密码算法,提出一种解决方案;结合此方案设计一种安全网关,该网关拥有SIP代理服务器的功能,任何SIP终端用户都可以方便地接入进来,从而有效提高了SIP网络的机密性、完整性、不可否认性。
Abstract:
 SIP is a transfer protocol based on the text,signaling simply,easy to use,is one of the core of the next generation network pro-tocol,which has great application. However,as the SIP doesn’ t take into the security issues account at the beginning of design,SIP proto-col is vulnerable to security threats in the application. Therefore,aiming at the security threats faced by SIP,combined with self-certified public key cryptographic algorithm based on the elliptic curve,put forward a kind of solution to solve the problem. Then design a security gateway combined with the solution. The gateway has a function of SIP proxy-server,and any SIP-user can access to it conveniently, thus effectively improving the confidentiality,integrity,non-repudiation for SIP network.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(07):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(07):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(07):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(07):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(07):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(07):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(07):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(07):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(07):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(07):47.

更新日期/Last Update: 2015-09-07