Comments on the S/KEY user authentication scheme
ACM SIGOPS Operating Systems Review
Password authentication with insecure communication
Communications of the ACM
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A Study of the Relative Costs of Network Security Protocols
Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Performance analysis of TLS Web servers
ACM Transactions on Computer Systems (TOCS)
Providing Response Identity and Authentication in IP Telephony
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Evaluating SIP server performance
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Billing attacks on SIP-based VoIP systems
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies
Network security: private communication in a public world, second edition
Network security: private communication in a public world, second edition
IAS '08 Proceedings of the 2008 The Fourth International Conference on Information Assurance and Security
A Survey of RFID Authentication Protocols Based on Hash-Chain Method
ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
Improving authentication performance of distributed SIP proxies
Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications
On cellular botnets: measuring the impact of malicious devices on a cellular network core
Proceedings of the 16th ACM conference on Computer and communications security
A study of the MD5 attacks: insights and improvements
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
How to break MD5 and other hash functions
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
SIP security issues: the SIP authentication procedure and its processing load
IEEE Network: The Magazine of Global Internetworking
The impact of TLS on SIP server performance
Principles, Systems and Applications of IP Telecommunications
The impact of TLS on SIP server performance: measurement and modeling
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
Authentication is an important mechanism for the reliable operation of any Voice over IP (VoIP) infrastructure. Digest authentication has become the most widely adopted VoIP authentication protocol due to its simple properties. However, even this lightweight protocol can have a significant impact on the performance and scalability of a VoIP infrastructure. In this paper, we present Proxychain - a novel VoIP authentication protocol based on a modified hash chain construction. Proxychain not only improves performance and scalability, but also offers additional security properties such as mutual authentication. Through experimental analysis we demonstrate an improvement of greater than 1700% of the maximum call throughput possible with Digest authentication in the same architecture. We show that the more efficient authentication mechanisms of Proxychain can be used to improve the overall security of a carrier-scale VoIP network.