Abstract
This paper presents, a new SIP based multi-party secure closed conference system. In the traditional participants, except of captain, conference system doesn’t have a privilege for UA (User Agent) that accepts or declines new participants. On the other hand, closed conference system supports this function. We also propose for closed conference system authentication procedure. By means of a real implementation, we provide an experimental performance analysis of SIP security mechanisms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rosenberg, J., et al.: Models for Multi Party Conferencing in SIP (January 2003)
Johnson, A.: SIP Call Control-Conferencing for User Agents (October 2003)
Mahy, R.: A Call Control and Multi-party usage Framework for the Session Initiation Protocol (SIP) (September 2003)
Franks, J., et al.: HTTP Authentication: Basic and Digest Access Authentication, IETF RFC 2617 (June 1999)
Rivest, R.: The MD5 Message-digest Algorithm, IETF RFC 1321 (April 1992)
Dianda, J.R., et al.: SIP. Bell Labs Technical Journal 7(1), 3–23 (2002)
Zenner, G.J., Jones, M.H., Patel, A.A.: Emerging Uses of SIP in Service Provider Networks. Bell Labs Technical Journal 8(1), 43–63 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J., Kim, H., Ahn, S., Chung, J. (2004). The Authentication and Processing Performance of Session Initiation Protocol (SIP) Based Multi-party Secure Closed Conference System. In: Cao, J., Yang, L.T., Guo, M., Lau, F. (eds) Parallel and Distributed Processing and Applications. ISPA 2004. Lecture Notes in Computer Science, vol 3358. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30566-8_84
Download citation
DOI: https://doi.org/10.1007/978-3-540-30566-8_84
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24128-7
Online ISBN: 978-3-540-30566-8
eBook Packages: Computer ScienceComputer Science (R0)