1st Edition

SIP Handbook Services, Technologies, and Security of Session Initiation Protocol

Edited By Syed A. Ahson, Mohammad Ilyas Copyright 2009
    614 Pages 244 B/W Illustrations
    by CRC Press

    Widely adopted by service providers to enable IP telephony, instant messaging, and other data services, SIP is the signaling protocol of choice for advanced multimedia communications signaling. Compiled by noted engineering experts Syed Ahson and Mohammad Ilyas, SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol presents a thorough technical review of all aspects of SIP. It captures the current state of IP Multimedia Subsystem technology and provides a unique source of comprehensive reference material on this subject.

    SIP Applications for Today and Tomorrow


    The scope of this volume ranges from basic concepts to future perspectives. Divided into three sections, the book begins with a discussion of SIP in peer-to-peer networks and then goes on to examine advanced media integration, migration considerations, mobility management, and group conferencing, while also reviewing home networking and compliance issues.

    The middle section of the book focuses on the underlying technologies of SIP. Chapters review network architecture, vertical handoffs, NAT traversals, multipoint extensions, and other areas at the forefront of research. Finally, the text examines various security vulnerabilities and provides perspectives on secure intelligent SIP services with a future outlook on a fraud detection framework in VoIP networks.

    Insights from International Researchers


    Authored by 65 experts from across the world, this text is sure to advance the field of knowledge in this ever-changing industry and provide further impetus for new areas of exploration. Because of the editors’ pivotal influence and their proximity to both the current market and the latest science, this work is certain to become the definitive text on this emerging technology.


    SIP in Peer-to-Peer Networks, H. Schmidt and F. J. Hauck

    SIP: Advanced Media Integration, M. Hurtado, A. Rios, A. Oller, J. Alcober, and S. Sallent

    SIP and IPv6 – Migration Considerations, Complications, and Deployment Scenarios, M. Boucadair and Y. Noisette

    SIP Mobility Management, C.-M. Huang and C.-H. Lee

    SIP Event Notification and Presence Information, C. Liu and B. Zhao

    Group Conference Management with SIP, T.C. Schmidt and M. Wählisch

    Home Networking System with SIP, Y. Nakamoto and N. Kuri

    Compliance and Interoperability Testing of SIP Devices, D. Bao, L. De Vito, S. Rapuano, and L. Tomaciello


    P2P SIP: Network Architecture and Resource Location Strategy, G. Chang, C. Zhu, and W. Ning

    SIP Mobility Technologies and the use of Persistent Identifiers to Improve Inter-Domain Mobility and Security, H. Jerez, J. Khoury, and C. Abdallah

    SIP and Vertical Handoffs in Heterogeneous Wireless Networks, J. Zhang, F.R. Yu, X. Wang, H.C.B. Chan,and V.C.M. Leung

    NAT Traversals, M. Baldi, F. Risso, and L. Torrero

    Multipoint Extensions for SIP, S. Ramadass and O. Abouabdalla

    Narrowcasting in SIP: Articulated Privacy Control, S. Alam, M. Cohen, J. Villegas, and A. Ahmed

    Q-SIP/SDP for QoS-guaranteed End-to-End Real-time Multimedia Service Provisioning on Converged Heterogeneous Wired and Wireless Networks, Y.-T. Kim and Y.-C. Jung

    SIP Modeling and Simulation, Y. Ding, G. Su, and H. Wang

    SIP-based Mobility Management and its Performance Evaluation, N. Banerjee and K. Basu


    SIP Security: Threats, Vulnerabilities and Countermeasures, D. Geneiatakis, G. Kambourakis and C. Lambrinoudakis

    SIP Vulnerabilities for SPIT, SPIT Identification Criteria, Anti-SPIT Mechanisms Evaluation Framework and Legal Issues, G.F. Marias, L. Mitrou, M. Theoharidou, J. Soupionis, S. Ehlert, and D. Gritzalis

    Anonymity in SIP, L. Kazatzopoulos, K. Delakourides, and G.F. Marias

    Secure Intelligent SIP Services, H. Abdallah

    SIP Security and Quality of Service Performance, J.I. Agbinya

    A Conceptual Architecture for SPIT Mitigation, Y. Rebahi, S. Dritsas, T. Golubenco, B. Pannier, and J.F. Juell

    Towards a Fraud Detection Framework in VoIP Networks, Y. Rebahi, T. Magedanz, and D. Sisalem


    Syed A. Ahson, Mohammad Ilyas