be found in literature, this section is absolutely not
exhaustive but a lot of useful references will be
provided.
2.1 SIP Architecture Overview
SIP (Session Initiation Protocol) is a protocol able
to set up a session among one or several users; the
definition of session, which we refer to, is given in
(RFC3261, 2002), that is: ”A multimedia session is a
set of multimedia senders and receivers and the data
streams flowing from senders to receivers. A multi-
media conference is an example of a multimedia ses-
sion”.
For brevity sake, here we just report a number of
entities which take part in SIP communication, the
most important components of the SIP architecture
are:
• SIP User Agent which represents an extremity of
the connection, that is the application used by the
final user in order to take part in the conversation.
It can act as client (User Agent Client - UAC), if it
makes requests, and it can act as server (User Agent
Server - UAS), if it must grant a request.
• SIP Network Server, which manages the signal-
ing to set up the connection. It can be of different
types: a Proxy Server: it is an intermediate appli-
cation which routes received SIP messages; its aim
is putting in touch the calling part with the called
part. A Redirect Server: it has only the task to ac-
cept the SIP requests, making addresses translation
to set up the call. A Registrar is a server which
accepts particular requests of registration by new
SIP users, which give the necessary information to
allow their location; such information are appro-
priately inserted in a database called ”location ser-
vice”.
According to the SIP protocol, the described
entities communicate through SIP suitable messages.
The protocol is of peer-to-peer type, even if the User
Agent interaction is of client-server type. The SIP
element, who takes the initiative in the communica-
tion for settling a session, assumes the role of client,
sending on a request of INVITE type towards a SIP
user, who is invited to the dialogue (SIP request). A
proxy has both client and server functionalities, while
a redirect server simply transmits responses to client
request, by mapping a specified address into actual
addresses.
2.2 Security in SIP
Currently, SIP requirements identify either HTTP Di-
gest or S-MIME as security mechanisms for provid-
ing selective security at SIP level. Both mechanisms
do not guarantee a high level of security, furthermore,
only the first one provides an authentication mecha-
nism. (radsip, 2001) examines the proposal for a
SIP extension to allow authentication of an user-agent
through a proxy with a RADIUS (RFC2865, 2000)
server; basic RADIUS protocol is not too much se-
cure, especially because all messages are exchanged
in plain text.
Some proposals which face such problems are
based on TLS session between the user-agent and
the proxy (TLS, 1999); with TLS, all SIP mes-
sages are exchanged in a secure environment. TLS
seems to be a good security solution but it requires
overhead and complexity, and the client needs to be
changed ad hoc to support the protocol. In (kerbpki,
2003) is described how to use Kerberos-PKI mech-
anism (RFC1510, 1993) for providing end-to-end
security between SIP clients. Once the client is au-
thenticated, and Kerberos key is generated, SIP client
can use the given key for encrypting and authenticat-
ing each others. Details about these and other secu-
rity mechanisms and protocols are omitted for brevity
sake; however, we are carrying on our analysis on
different mechanisms (diameter, 2003; RFC1994,
1996), trying to let the SIP-architecture support differ-
ent security-levels, because, as explained later, these
could strongly affect the definitive performance of the
architecture.
3 ARCHITECTURE DESIGN
PARAMETERS
The design of systems, which are critical for time and
security, is a very complex task that needs to be faced
in a systematic way to take in count all critical pa-
rameters. Almost all choices, needed from the early
stages of the design process, could heavy influence
the global system security/performance; this suggests
us to consider all the playing parameters and ana-
lyze their possible impact on those critical aspects, as
soon as possible during the design phases. At this
aim, in this paper we propose a ”policy-based and
performance-oriented framework” to be able to de-
sign a SIP architecture with pre-assigned performance
and security requirements. The framework has been
designed on standard SIP components and specifica-
tions and on a set of security rules about the way these
components must be interconnected to guarantee a
pre-assigned set of functionality and a pre-defined se-
curity level which characterizes the specific security
mechanism. As said, the way to interconnect the ba-
sic elements is one of the most critical aspect, it has
a great impact on system security, on availability and
on performances, too.
ICETE 2004 - SECURITY AND RELIABILITY IN INFORMATION SYSTEMS AND NETWORKS
210