SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Widely adopted by service providers to enable IP telephony, instant messaging, and other data services, SIP is the signaling protocol of choice for advanced multimedia communications signaling. Compiled by noted engineering experts Syed Ahson and Mohammad Ilyas, SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol presents a thorough technical review of all aspects of SIP. It captures the current state of IP Multimedia Subsystem technology and provides a unique source of comprehensive reference material on this subject. SIP Applications for Today and Tomorrow   The scope of this volume ranges from basic concepts to future perspectives. Divided into three sections, the book begins with a discussion of SIP in peer-to-peer networks and then goes on to examine advanced media integration, migration considerations, mobility management, and group conferencing, while also reviewing home networking and compliance issues. The middle section of the book focuses on the underlying technologies of SIP. Chapters review network architecture, vertical handoffs, NAT traversals, multipoint extensions, and other areas at the forefront of research. Finally, the text examines various security vulnerabilities and provides perspectives on secure intelligent SIP services with a future outlook on a fraud detection framework in VoIP networks. Insights from International Researchers   Authored by 65 experts from across the world, this text is sure to advance the field of knowledge in this ever-changing industry and provide further impetus for new areas of exploration. Because of the editors’ pivotal influence and their proximity to both the current market and the latest science, this work is certain to become the definitive text on this emerging technology.

Author(s): Syed A. Ahson, Mohammad Ilyas
Year: 2008

Language: English
Pages: 596

142006603X......Page 1
SIP HANDBOOK: SERVICES, TECHNOLOGIES, AND SECURITY OF SESSION INITIATION PROTOCOL......Page 3
Contents......Page 5
Preface......Page 8
Editors......Page 10
Contributors......Page 11
Part I: CONCEPTS & SERVICES......Page 16
1.1 Introduction......Page 17
1.2.1 Peer-to-Peer Networks......Page 18
1.2.2 SIP Fundamentals......Page 19
1.3.1 Extension of SIP......Page 20
1.3.2 Extension of the SIP Location Service......Page 22
1.5 Field of Application of P2P SIP......Page 24
1.7 Conclusion......Page 25
References......Page 26
2.1 Introduction......Page 28
2.2 Building Advanced Media Services......Page 29
2.2.1 Media Server Control Mechanisms......Page 30
2.2.1.1 CCXML and VoiceXML......Page 31
2.2.1.4 MEDIACTRL......Page 32
2.2.1.5 Media Server Control API (JSR2309)......Page 33
2.2.2 SIP Application Servers......Page 34
2.2.2.1 Java-Based Approach......Page 35
2.2.2.2 Developing Advanced Media Services Using Open Source Tools......Page 36
2.3 Service-Oriented Architecture (SOA)......Page 38
2.3.1 SOA and SIP Convergence......Page 39
2.5 Service Convergence Platform of Telecom Operators......Page 41
2.6 SIP and the Future of the Internet......Page 44
2.7.1 Example of Advanced Service: On-Line Transcoding......Page 46
2.7.2 SIP Infrastructure......Page 47
2.7.4 Examples of High-End Videoconferencing......Page 49
References......Page 53
3.1.1 General Context......Page 56
3.1.2 Beyond the State of the Art......Page 57
3.2 Why Introducing IPv6 Could Be Problematic for SIP-Based Architectures......Page 59
3.3 Business and Service Considerations Regarding IPv6 VoIP Migration......Page 60
3.3.1 Context and Objectives......Page 61
3.3.2 Input from IPv6 Transport Migration......Page 64
3.3.3 Business and Strategy Considerations......Page 65
3.3.4.1 First Alternative......Page 66
3.3.4.2 Second Alternative......Page 68
3.3.5 Service Engineering Recommendations......Page 69
3.3.6 Focus on Quality of Service......Page 70
3.4 Handling Technical Issues Raised When Migrating SIP-Based Services to IPv6......Page 71
3.4.1.2 New SIP Attribute: “atypes”......Page 72
3.4.2 Blank SDP Procedure......Page 74
3.4.2.1 Application to Alternative 1......Page 75
3.4.2.2 Application to Alternative 2......Page 77
3.5 Conclusions......Page 80
References......Page 81
4.1 SIP-Based Host Mobility......Page 83
4.1.1 Pre-Call Operation......Page 84
4.1.2 Mid-Call Operation......Page 85
4.2 SIP-Based Network Mobility......Page 86
4.2.1 System Components......Page 87
4.2.2 Re-Registration Operation......Page 88
4.2.3 Re-Invitation Operation......Page 90
4.2.4 Route Optimization......Page 91
4.3.1 Protocol Layer......Page 93
4.3.5 Mobility Support......Page 94
4.3.7 Header Overhead......Page 95
4.3.11 Nesting Impact......Page 96
References......Page 97
5.1 Introduction......Page 99
5.2.1 Definitions......Page 100
5.2.2 Operation Overview......Page 101
5.2.3 A Walk-Through Example......Page 102
5.3.1 Overview......Page 106
5.3.3.1 Operations of the Presence Service......Page 107
5.3.3.2 The Presence Event Package......Page 108
5.3.4 A Walk-Through Example......Page 109
5.4.1 Overview......Page 111
5.4.2.2 XML-Encoded PIDF......Page 112
5.4.3 Examples......Page 113
5.5.1 Introduction......Page 114
5.5.3 Operation......Page 115
5.5.4 Resource List Attributes......Page 116
5.5.5 A Walk-Through Example......Page 119
5.6.1.1 IP Multimedia Subsystem (IMS) of 3GPP......Page 127
5.6.1.2 OMA Presence Service......Page 129
5.6.2 Current Research and Standard of Presence Features That Have Been Developed for SIP......Page 132
References......Page 133
6.1 Introduction......Page 135
6.1.1 Two Introductory Scenarios......Page 136
6.1.1.1 Three-Way Conference......Page 137
6.1.1.2 Large-Scale Conference......Page 139
6.1.2.1 Audio Conferences......Page 140
6.1.2.2 Videoconferencing over IP......Page 141
6.1.4 Presence and Instant Messaging......Page 142
6.1.5 SIP and the IMS......Page 143
6.2.1.2 Tight Coupling......Page 144
6.2.1.3 Full Distribution......Page 146
6.2.2.1 Join Header......Page 147
6.2.2.3 REFER Method......Page 148
6.2.2.5 Conferencing Event States......Page 149
6.2.3 SIP with Multicast......Page 150
6.2.3.1 Any-Source Multicast......Page 151
6.2.3.2 Source-Specific Multicast......Page 152
6.2.3.3 Application Layer Multicast......Page 153
6.2.4 Mobile Group Members......Page 154
6.2.4.1 Unicast-Based Mobility......Page 155
6.2.4.2 Mobile Multicast......Page 156
6.3.1 A Hybrid Architecture for Transparent Group Communication......Page 157
6.4 Peer-Managed Conferences......Page 159
6.4.1 A Simple, Distributed Point-to-Point Model......Page 160
6.4.2 Scalable, Peer-Centric Conferencing Based on SSM......Page 162
6.5 Summary and Conclusions......Page 164
References......Page 165
7.1 Introduction......Page 170
7.2 UPnP......Page 171
7.3 SIP......Page 173
7.5.1 Discovery: Advertisement......Page 176
7.5.2 Discovery: Search......Page 178
7.6 Middleware Implementation......Page 179
7.7 Conclusion......Page 180
References......Page 181
8.1 Protocol Testing......Page 183
8.1.2 Interoperability Testing......Page 184
8.1.3 Compliance Versus Interoperability Testing......Page 185
8.2 Protocol Testing Methods......Page 186
8.2.1.1 Example: SIP REGISTER Session State Machine......Page 187
8.2.2 SIP Testing......Page 188
8.2.2.1 ETSI TS 102 027 Technical Specification for SIP IETF RFC 3261......Page 189
8.2.3 SIP Interoperability Test Events......Page 190
8.3 SIP Testing Tools......Page 193
8.3.1.2 LinkBit Online Protocol Analyzer/Decoder......Page 195
8.3.1.5 Empirix......Page 196
8.3.2.5 Compliance Engine......Page 197
8.3.3 Robustness Tools......Page 198
8.3.3.2 Codenomicon SIP Test Tool......Page 199
8.4.2 Set Up of the Test Environment......Page 200
8.4.3 Testing by Means of a State Machine Approach......Page 201
8.4.4.1 INVITE Features......Page 203
8.4.4.2 State Machine Transitions and ACK Response......Page 204
8.4.5 Robustness Tests......Page 205
8.5 Conclusions and Future Directions......Page 206
References......Page 207
Part II: TECHNOLOGIES......Page 210
9.1 Introduction......Page 211
9.2 Peer-to-Peer Network Technologies......Page 212
9.2.1 Chord......Page 213
9.2.2 Pastry and Bamboo......Page 216
9.3.1.1 Node-Level Operations......Page 218
9.3.1.2 User Operations......Page 219
9.3.2 A P2P Architecture for SIP-Based IP Telephony System......Page 220
9.4.1 Concepts and High-Level Description......Page 223
9.4.2 An Architecture for P2P SIP......Page 224
9.4.3 A Hierarchical P2P-SIP Architecture......Page 225
9.5.2 The dSIP Protocol......Page 226
9.5.2.2 P2P Overlay Structure......Page 227
9.5.3 The RELOAD Protocol......Page 228
9.6 Concluding Remarks......Page 230
References......Page 231
CONTENTS......Page 234
10.1 Introduction......Page 235
10.2.1 Sessions and Mobility......Page 236
10.3 Host Identification and Mobility......Page 240
10.3.1 H-SIP: Abstraction Layer......Page 242
10.3.2 Authentication and Registration......Page 243
10.3.3 Routing......Page 245
10.4.1 Testbed......Page 247
10.4.2.1 Registration......Page 248
10.4.2.2 Call Establishment......Page 250
10.4.3.1 Registration......Page 251
10.4.3.2 Call Establishment......Page 252
10.4.3.3 DNS vs. Handle-DNS Resolution......Page 253
10.5 Future Work......Page 254
10.6 Conclusion......Page 255
References......Page 256
11.1 Introduction......Page 260
11.2.1 Network Layer Solutions......Page 264
11.2.2 Transport Layer Solutions......Page 266
11.2.3 Application Layer Solutions......Page 267
11.3 Seamless Vertical Handoff Support Using SIP......Page 269
11.3.1 S-SIP Handoff Scheme......Page 270
11.3.2 Handoff Period......Page 271
11.3.3 Handoff Initiation Based on User Mobility......Page 272
11.3.4 Simulations Results and Discussions......Page 273
11.4 Efficient Transport of SIP Traffic over SCTP......Page 274
11.4.1 SIP and SCTP Retransmission Mechanisms......Page 275
11.4.2 Proposed Scheme of SIP over PR-SCTP......Page 276
11.4.3 Simulation Results and Discussions......Page 277
References......Page 279
12.1 Introduction......Page 283
12.2 NAT Behavior......Page 284
12.2.2 Mapping Refresh......Page 285
12.2.3 Filtering Behavior......Page 287
12.3 Problem Statement......Page 288
12.4.1 Hole Punching......Page 290
12.4.2 Relaying......Page 292
12.4.3 STUN: A Standardized Set of Functionalities to Support NAT Traversal......Page 295
12.4.4 TURN: A STUN Extension to Support Relaying......Page 297
12.5.1 Signaling Layer: Ensuring Correct Delivery of a Response to a SIP Request......Page 298
12.5.2 Signaling Layer: Ensuring UA Reachability and Supporting Mid-Dialog Requests......Page 301
12.5.3 Traversal for Media Flows: ICE......Page 304
12.6 ALEX: Ensuring End-to-End Connectivity for Both SIP and Media Flows across NATs......Page 308
References......Page 311
13.1 Introduction......Page 313
13.2 Multipoint Session Initiation Protocol (MSIP) Entities......Page 314
13.2.3 MSIP Client Behavior......Page 315
13.3.3 Session Establishment......Page 316
13.4 Messages Flow......Page 317
13.4.1.1 Registration Phase......Page 318
13.4.1.2 Session Initiation Phase......Page 320
13.4.1.4 Joining a Session Phase......Page 323
13.4.1.5 Controlling the Session and Session Updates Phase......Page 324
13.4.1.6 Terminating a Session Phase......Page 327
14.1 Introduction......Page 329
14.2 Conferencing......Page 331
14.2.2 SIP Conference Control......Page 332
14.2.3 Conference Privacy......Page 333
14.3 Media Privacy: Narrowcasting Concept......Page 334
14.3.1 Mute......Page 336
14.3.2 Deafen......Page 337
14.4 System Design and Implementation......Page 338
14.4.2 Policy Evaluation......Page 339
14.4.3 Media Mixing and Distribution......Page 340
14.4.5 Narrowcasting Interfaces......Page 341
14.4.6 System Performance......Page 344
14.5.1 Practical Conferencing......Page 345
14.5.2 Event Notification Framework for Exchanging Narrowcasting Control Status Information......Page 346
14.5.4 Convergence......Page 348
References......Page 349
15.1 Introduction......Page 352
15.2.1 Heterogeneous Subnetwork Technologies in Broadband Convergence Network (BcN)......Page 354
15.2.2 SIP/SDP......Page 355
15.2.3 RSVP-TE for IP/(T-)MPLS Subnetwork......Page 356
15.3.1 Q-SIP/SDP Interaction for End-to-End QoS Session Negotiation......Page 357
15.3.2 Connection Establishment in the IP/MPLS Transit Network......Page 361
15.3.3 Resource Reservation and CAC on IEEE 802.3 Fast/Gigabit Ethernet Switch......Page 364
15.3.4 Resource Reservation and CAC in IEEE 802.11e WLAN......Page 366
15.3.5 QoS-Aware CNM (Q-CNM)......Page 367
15.4.1 Testbed Network of Converged Heterogeneous Wired and Wireless Networks......Page 368
15.4.2.1 Connectivity Establishment for QoS Provisioning at Fast/Gigabit Ethernet......Page 369
15.4.2.2 Connectivity Establishment for QoS Provisioning at IEEE 802.11e Wireless LAN......Page 370
15.4.2.3 Connection Establishment for QoS Provisioning at IP/MPLS Backbone Network......Page 371
15.4.3 Performance Analysis of End-to-End QoS Provisioning......Page 373
15.5 Conclusions......Page 375
References......Page 376
16.1.1 Background......Page 378
16.1.3 Our Work......Page 379
16.2.1 Finite State Machine (FSM)......Page 380
16.2.2 Unified Modeling Language......Page 383
16.2.3 Petri Net Cluster......Page 385
16.3.1 Formal Definition of Timed HCPN and CPN Tools......Page 387
16.3.2.1 Whole SIP Modeling......Page 389
16.3.2.2 Simplified SIP Modeling......Page 390
16.3.3 Timed SIP Model......Page 391
16.3.4 Simulation and Analysis......Page 394
16.4.1 NS-2 and SIP Modeling......Page 395
16.4.2.1 OPNET and QualNet......Page 397
References......Page 398
17.2 Introduction......Page 402
17.3 Mobility Management......Page 404
17.3.2 Network Layer......Page 406
17.3.4 Application Layer......Page 407
17.4.1 Link-Layer (Subnetwork-Layer) Mobility......Page 408
17.4.2 Network-Layer Mobility......Page 409
17.4.3 Transport-Layer Mobility......Page 410
17.4.4 Application-Layer Mobility......Page 411
17.5.1 SIP Mobility Support......Page 413
17.5.2 System Architecture for Performance Evaluation......Page 415
17.5.3 Handoff Delay Analysis......Page 420
17.6 Handoff Delay Mitigations......Page 429
17.7 Summary......Page 433
References......Page 434
Part III: SECURITY......Page 437
18.1 Introduction......Page 438
18.2 SIP Threats and Vulnerabilities......Page 439
18.3 Attacks against the SIP......Page 440
18.3.2 Parsing and Message Injection Attacks......Page 442
18.3.3 Flooding Attacks......Page 444
18.3.4 Signaling Attacks......Page 447
18.4.1 SIP Security Requirement 1: Confidentiality......Page 450
18.5 SIP Security Mechanisms and Services......Page 451
18.6 Conclusions......Page 455
References......Page 456
19.1 Introduction......Page 459
19.2.1 SPIT Definitions......Page 461
19.2.2 Motivation......Page 462
19.3 SPIT Vulnerability Analysis......Page 463
19.4 SPIT Identification Criteria......Page 467
19.4.1.2 SIP Headers’ Semantics (SIP Message Oriented)......Page 468
19.5.1 Anti-SPIT Mechanisms Description......Page 470
19.5.1.1 SPIT Prevention Using Anonymous Verifying Authorities (AVA)......Page 471
19.5.1.5 Progressive Multi Grey-Leveling......Page 472
19.5.1.9 DSIP......Page 473
19.5.2 Anti-SPIT Mechanisms Classification......Page 474
19.6.1 Assessment Criteria......Page 475
19.6.2 Compliance of SPIT Mechanisms to Assessment Criteria......Page 476
19.7 Anti-SPIT Mechanisms and Legal Issues......Page 478
19.8 Conclusions......Page 479
References......Page 480
20.1 Introduction......Page 482
20.2 Motivation......Page 483
20.3 Generalized Anonymity Architectures......Page 485
20.4 Proposals for Anonymity in SIP......Page 488
20.5.1 Mist at a Glance......Page 489
20.5.2 Applying MIST in SIP......Page 492
20.5.2.2 Mobility Issues......Page 493
20.5.2.4 Making a VoIP Call......Page 494
References......Page 496
21.1 Background......Page 499
21.2 Introduction......Page 500
21.3.1 Interworking SIP and IN Applications......Page 501
21.3.2 ENUM Call Flows for VoIP Interworking......Page 504
21.3.3 TRIP for Exporting Phone Routes......Page 505
21.3.4 Implementing Intelligent Network Services in VoIP Application......Page 507
21.4.1 Threats of the Intelligent Network......Page 510
21.4.2 Secure the Intelligent Network with SIP......Page 512
21.4.3 Application of Secure VoIP......Page 514
References......Page 518
22.1 Introduction......Page 520
22.2.1 Measuring Session Based QoS Performance......Page 521
22.2.2 QoS and SIP......Page 523
22.2.2.1.1 Call setup delay......Page 524
22.2.2.1.2 Message transfer delay......Page 526
22.2.2.2 Mobility and Handoff Delay......Page 527
22.2.2.2.1 Mobility management using mobile IP......Page 528
22.2.2.2.2 Mobility management using SIP......Page 529
22.2.2.3 Handoff Delay......Page 533
22.2.2.4 Disruption Time......Page 535
22.2.3 Handoff Delay Disruption of SIP in IP Services......Page 537
22.2.3.1 Handoff Delay Disruption of SIP in VoIP Services......Page 539
22.2.3.1.2 Intradomain handoff delay......Page 540
22.2.3.1.3 Interdomain handoff delay......Page 541
22.2.3.1.4 Disruption time with shadow registration......Page 542
22.2.3.2 Performance of SIP in Fax over IP......Page 543
22.2.3.2.1 Experimental network models......Page 544
22.2.4 Effects of Security Protocols on Performance of SIP......Page 546
22.3 SIP Security......Page 547
22.3.1 Threats from Vulnerability of SIP......Page 548
22.3.2 Threats in SIP Communication Chain......Page 549
22.3.3 Attacks and Threat Models......Page 550
22.3.4.2 Security Mechanisms......Page 551
22.3.4.2.1 Network layer security mechanisms......Page 552
22.3.4.2.2 Transport layer security mechanisms......Page 553
22.3.4.2.3 Application layer security mechanisms......Page 555
22.3.4.3 SIP Processing Cost......Page 557
References......Page 558
23.1 Introduction......Page 561
23.3 SPIT Emergence and Persistence: Potential Reasons......Page 563
23.3.3 Automated SPIT......Page 564
23.4 Architecture......Page 565
23.4.1.1 Authentication Module......Page 566
23.4.1.2 Proxy Check Module......Page 567
23.4.1.3.1 Building white/black lists......Page 568
23.4.1.3.3 Scored global lists......Page 569
23.4.1.4.1 Detect suspicious traffic......Page 570
23.4.1.4.2 Detect safe calls......Page 571
23.4.1.5 Challenge/Response Module......Page 572
23.4.1.6 Audio Analyzer......Page 573
23.4.2.1 Case Study 1......Page 575
23.4.2.2 Case Study 2......Page 577
References......Page 578
24.1 Introduction......Page 580
24.2.2 Fraud in General......Page 581
24.2.3 Fraud in VoIP......Page 582
24.2.4.1 Rule Based Detection......Page 584
24.2.4.2 Artificial Intelligence Based Detection......Page 585
24.3.1 Special Requirements in the VoIP Anti-Fraud Fight......Page 586
24.3.2 Steps Towards the Anti-Fraud Framework......Page 588
24.3.3 Functional Architecture......Page 590
24.4 Conclusion......Page 594
References......Page 595