scholarly journals Modelo Sip Seguro para una Comunicación extremo a extremo sobre IPV6

2019 ◽  
pp. 63-68

Modelo Sip Seguro para una Comunicación extremo a extremo sobre IPV6 Sip Security Model for End to End Communication on IPv6 Ross M. Benites, José L Quiroz, Raúl Villafani INICTEL-UNI, Lima 41 DOI: https://doi.org/10.33017/RevECIPeru2011.0024/ RESUMEN Las implementaciones VoIP hoy en día se han incrementado considerablemente, sin embargo no entodos los escenarios se tiene en cuenta los mecanismos de seguridad adecuados. Este último punto es muy importante a considerar el día de hoy , sobre todo por el agotamiento de las direcciones IPV4 y el despliegue hacia IPV6 de muchos de los servicios, donde aparecerán nuevas amenazas a la seguridad que trataran de opacar el gran auge de la tecnología VoIP. Si bien IPv6 fue desarrollado para solucionar muchas vulnerabilidades en seguridad que actualmente se ven presentes en IPv4, el hecho es que no logra alcanzar aún estas metas según pruebas realizadas. El protocolo SIP, el actor principal de la tecnología VoIP , requiere de la implementación de mecanismos de seguridad . Los escenarios actuales requieren terminales de usuario de alto rendimiento y soporte para adaptarse a mecanismos de seguridad heterogéneos o asumir relaciones de confianza. Sin embargo debemos tener en cuenta que hay varias combinaciones de soluciones de seguridad que son proporcionados por usuarios finales y los servidores. En este trabajo se expone un modelo de seguridad aplicado a un escenario experimental VoIP sobre el Internet de Próxima Generación (IPv6), que utiliza la seguridad salto a salto y extremo a extremo. El escenario propuesto se encuentra sobre una red local con direcciones IPv6. Utiliza dos servidores Asterisk implementados bajo las mismas características que cumplen la función de SIP Proxy, y se encuentran conectados mediante un enlace troncal SIP – TLS. Se utilizan además dos terminales de usuario (teléfonos IP) provenientes de una marca comercial conocida, registrados cada uno mediante el protocolo SIP-TLS a cada servidor Asterisk. En trabajos anteriores, se han realizado varios estudios sobre el rendimiento del uso de VoIP sobre IPv4 e IPv6 comparando los resultados [1], evaluación de mecanismos de seguridad para mantener la autenticación de usuario, confidencialidad e integridad de la señalización y media de los mensajes VoIP sobre las redes IPv4 [2] y [3]. Este trabajo se esboza en un marco de seguridad, donde se presenta un escenario basado en una red VoIP en IPV6 utilizando TLS y SRTP. TLS es utilizado para la seguridad en el establecimiento de la sesión con mecanismos de autenticación salto a salto y SRTP (Secure Real Time Protocol) para la seguridad del establecimiento del stream de media. Nos enfocaremos en analizar y evaluar la seguridad de los mensajes en este escenario sobre el protocolo de transporte seguro (TLS). Descriptores: sip, tls ,ipv6, srtp. ABSTRACT VoIP deployments today have increased considerably, but not all the scenarios consider appropriate security mechanisms. This last point is very important to consider today, especially the depletion of IPv4 addresses and the deployment of many services IPv6, where will new security threats to try to overshadow the great technology boom VoIP. Although IPv6 was developed to solve many security vulnerabilities are currently present in IPv4, the fact is that still fails to achieve these goals by testing. The SIP protocol, the main actor of VoIP technology requires the implementation of security mechanisms. The current scenarios require high-end user performance and support to adapt to heterogeneous security mechanisms or assume trust relationships. But keep in mind that there are various combinations of security solutions that are provided by end users and servers. This paper presents a security model applied to an experimental scenario VoIP over Next Generation Internet (IPv6), which uses hop by hop security and end to end. The proposed scenario is on a local network with IPv6 addresses. Use two Asterisk servers implemented under the same characteristics that act as SIP Proxy, and are connected via SIP trunk - TLS. They also use two user terminals (IP phones) from a known trade mark registered by each SIP-TLS protocol for each server Asterisk. In previous work, there have been several studies on the performance of VoIP using IPv6 and IPv4 and comparing the results [1], evaluation of security mechanisms to support user authentication, confidentiality and integrity of the signaling and media messages VoIP over IPv4 networks [2] and [3]. This paper outlines a framework of security, which presents a scenario based on a VoIP network in IPv6 using TLS and SRTP. TLS is used for the security session establishment authentication mechanisms hop by hop and SRTP (Secure Real Time Protocol) for the safety of the establishment of media stream. We will focus on analyzing and evaluating the security of the messages in this scenario the secure transport protocol (TLS) . Keywords: sip, tls ,ipv6, srtp.

2001 ◽  
Author(s):  
Raj Rajkumar ◽  
K. Juvva ◽  
A. Molano ◽  
S. Oikawa ◽  
C. Lee
Keyword(s):  

Author(s):  
Mobeen Ur Rehman ◽  
Muhammad Adnan ◽  
Mouazma Batool ◽  
Liaqat Ali Khan ◽  
Ammar Masood

2021 ◽  
Author(s):  
Tomasz Hadas ◽  
Grzegorz Marut ◽  
Jan Kapłon ◽  
Witold Rohm

<p>The dynamics of water vapor distribution in the troposphere, measured with Global Navigation Satellite Systems (GNSS), is a subject of weather research and climate studies. With GNSS, remote sensing of the troposphere in Europe is performed continuously and operationally under the E-GVAP (http://egvap.dmi.dk/) program with more than 2000 permanent stations. These data are one of the assimilation system component of mesoscale weather prediction models (10 km scale) for many nations across Europe. However, advancing precise local forecasts for severe weather requires high resolution models and observing system.   Further densification of the tracking network, e.g. in urban or mountain areas, will be costly when considering geodetic-grade equipment. However, the rapid development of GNSS-based applications results in a dynamic release of mass-market GNSS receivers. It has been demonstrated that post-processing of GPS-data from a dual-frequency low-cost receiver allows retrieving ZTD with high accuracy. Although low-cost receivers are a promising solution to the problem of densifying GNSS networks for water vapor monitoring, there are still some technological limitations and they require further development and calibration.</p><p>We have developed a low-cost GNSS station, dedicated to real-time GNSS meteorology, which provides GPS, GLONASS and Galileo dual-frequency observations either in RINEX v3.04 format or via RTCM v3.3 stream, with either Ethernet or GSM data transmission. The first two units are deployed in a close vicinity of permanent station WROC, which belongs to the International GNSS Service (IGS) network. Therefore, we compare results from real-time and near real-time processing of GNSS observations from a low-cost unit with IGS Final products. We also investigate the impact of replacing a standard patch antenna with an inexpensive survey-grade antenna. Finally, we deploy a local network of low-cost receivers in and around the city of Wroclaw, Poland, in order to analyze the dynamics of troposphere delay at a very high spatial resolution.</p><p>As a measure of accuracy, we use the standard deviation of ZTD differences between estimated ZTD and IGS Final product. For the near real-time mode, that accuracy is 5 mm and 6 mm, for single- (L1) and dual-frequency (L1/L5,E5b) solution, respectively. Lower accuracy of the dual-frequency relative solution we justify by the missing antenna phase center correction model for L5 and E5b frequencies. With the real-time Precise Point Positioning technique, we estimate ZTD with the accuracy of 7.5 – 8.6 mm. After antenna replacement, the accuracy is improved almost by a factor of 2 (to 4.1 mm), which is close to the 3.1 mm accuracy which we obtain in real-time using data from the WROC station.</p>


2022 ◽  
Vol 18 (1) ◽  
pp. 1-41
Author(s):  
Pamela Bezerra ◽  
Po-Yu Chen ◽  
Julie A. McCann ◽  
Weiren Yu

As sensor-based networks become more prevalent, scaling to unmanageable numbers or deployed in difficult to reach areas, real-time failure localisation is becoming essential for continued operation. Network tomography, a system and application-independent approach, has been successful in localising complex failures (i.e., observable by end-to-end global analysis) in traditional networks. Applying network tomography to wireless sensor networks (WSNs), however, is challenging. First, WSN topology changes due to environmental interactions (e.g., interference). Additionally, the selection of devices for running network monitoring processes (monitors) is an NP-hard problem. Monitors observe end-to-end in-network properties to identify failures, with their placement impacting the number of identifiable failures. Since monitoring consumes more in-node resources, it is essential to minimise their number while maintaining network tomography’s effectiveness. Unfortunately, state-of-the-art solutions solve this optimisation problem using time-consuming greedy heuristics. In this article, we propose two solutions for efficiently applying Network Tomography in WSNs: a graph compression scheme, enabling faster monitor placement by reducing the number of edges in the network, and an adaptive monitor placement algorithm for recovering the monitor placement given topology changes. The experiments show that our solution is at least 1,000× faster than the state-of-the-art approaches and efficiently copes with topology variations in large-scale WSNs.


2010 ◽  
Vol 6 (1) ◽  
pp. 970868 ◽  
Author(s):  
G. W. Eidson ◽  
S. T. Esswein ◽  
J. B. Gemmill ◽  
J. O. Hallstrom ◽  
T. R. Howard ◽  
...  

Water resources are under unprecedented strain. The combined effects of population growth, climate change, and rural industrialization have led to greater demand for an increasingly scarce resource. Ensuring that communities have adequate access to water—an essential requirement for community health and prosperity—requires finegrained management policies based on real-time in situ data, both environmental and hydrological. To address this requirement at the state level, we have developed the South Carolina Digital Watershed, an end-to-end system for monitoring water resources. In this paper, we describe the design and implementation of the core system components: (i) in situ sensing hardware, (ii) collection and uplink facilities, (iii) data streaming middleware, and (iv) back-end repository and presentation services. We conclude by discussing key organizational and technical challenges encountered during the development process.


Sign in / Sign up

Export Citation Format

Share Document