DocumentCode :
3309693
Title :
Efficient Resource Registration and Location Scheme in P2P-SIP, using ID-based Signature
Author :
Lee, Chang-Hwan ; Han, Kyu-suk ; Lee, Young-hee
Author_Institution :
Sch. of Eng., Inf. & Commun. Univ., Daejeon
Volume :
3
fYear :
2008
fDate :
17-20 Feb. 2008
Firstpage :
1823
Lastpage :
1827
Abstract :
SIP (session initiation protocol) [1] is widely used in Internet as a signaling protocol for VoIP (voice over IP) and multimedia services. Recently, there have been some efforts to propose peer-to-peer SIP (P2P-SIP) architecture, which makes use of a peer-to-peer network instead of registrar and location SIP servers in order to facilitate SIP user registration and location. One of main issues in P2P-SIP is authentication of resource such as SIP user information without an authentication server. In order to authenticate the resources in P2P-SIP, the signature can be attached to the end of SIP message under PKI (Public Key Infrastructure) framework. However, the PKI-based signature model in P2P-SIP requires verification of central authorities (CA) during SIP message routing and certificates maintenance of intermediate nodes for authentication procedure. It causes much delay in signaling as users increase in P2P-SIP. Especially, much delay in signaling of real-time multimedia communication can be a significant problem. In this paper, we propose an efficient resource registration and location scheme in P2P-SIP, using ID-based signature which has more light-weight authentication procedures. ID-based cryptography is firstly proposed in [2], which is signature scheme, based on the bilinear pairings on elliptic curves. ID-based signature allows users to verify digital signatures using only public information such as the user´s identity, while PKI-based signature requires verification of each user´s public key from CAs. It can utilize public identifier such as e-mail ID or SIP-URI as a public key, so that it reduces the complexity and costs for establishing and managing the public key of nodes. In this paper, we identify efficiency of this resource registration and location scheme, using ID-based signature in comparison with PKI-based signature model through simulation.
Keywords :
cryptographic protocols; digital signatures; peer-to-peer computing; public key cryptography; resource allocation; signalling protocols; ID-based digital signature; Internet; P2P-SIP; PKI; VoIP; location scheme; multimedia service; peer-to-peer architecture; public key verification; resource registration; session initiation protocol; Authentication; Delay; Identity-based encryption; Internet telephony; Network servers; Peer to peer computing; Protocols; Public key; Web and internet services; Web server; ID-based signature; P2P-SIP; VoIP;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on
Conference_Location :
Gangwon-Do
ISSN :
1738-9445
Print_ISBN :
978-89-5519-136-3
Type :
conf
DOI :
10.1109/ICACT.2008.4494139
Filename :
4494139
Link To Document :
بازگشت