Journal of Northeastern University ›› 2004, Vol. 25 ›› Issue (11): 1042-1045.DOI: -

• OriginalPaper • Previous Articles     Next Articles

Security strategy in softswitch

Lin, Na (1); Wang, Ze (1); Wang, Guang-Xing (1)   

  1. (1) Sch. of Info. Sci. and Eng., Northeastern Univ., Shenyang 110004, China
  • Received:2013-06-24 Revised:2013-06-24 Online:2004-11-15 Published:2013-06-24
  • Contact: Lin, N.
  • About author:-
  • Supported by:
    -

Abstract: A feasible solution is proposed to the security problem of SIP protocol in softswitch since no security strategy has been defined by SIP itself. The function characters and working mechanism of SIP protocol in softswitch, especially its existing security problem are described briefly. Then the security strategy, encryption process, security and performance of PGP (Pretty Good Privacy) which is originally designed for encryption and signature of e-mail are analyzed in detail. The widely-used highly secure PGP security strategy is thus introduced into SIP protocol to meet the security requirements of SIP message transmission. Expatiates the implementation of PGP in SIP protocol is expatiated and the formats of SIP INVITE message with PGP encryption and with digital PGP signature is examplified.

CLC Number: