Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Systems, Networks, and Communications
Volume 2008 (2008), Article ID 380468, 8 pages
http://dx.doi.org/10.1155/2008/380468
Research Article

Integrating Usage Control with SIP-Based Communications

1Information Security Track, College of Information Technology, United Arab Emirates (UAE) University, P.O. Box 15551, Al Ain, United Arab Emirates
2Networking Track, College of Information Technology, United Arab Emirates (UAE) University, P.O. Box 15551, Al Ain, United Arab Emirates

Received 25 September 2008; Accepted 8 October 2008

Academic Editor: Abderrahim Benslimane

Copyright © 2008 E. Barka and A. Lakas. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

The Session Initiation Protocol (SIP) is a signaling protocol used for establishing and maintaining communication sessions involving two or more participants. SIP was initially designed for voice over IP and multimedia conferencing, and then was extended to support other services such as instant messaging and presence management. Today, SIP is also adopted to be used with 3G wireless networks, thus it becomes an integral protocol for ubiquitous environment. SIP has various methods that support a variety of applications such as subscribing to a service, notification of an event, status update, and location and presence services. However, when it comes to security, the use of wireless and mobile communication technologies and the pervasive nature of this environment introduce higher risks to security than that of the old simple environment. In this paper, we introduce new architecture that implements a new type of access control called usage access control (UCON) to control the access to the SIP-based communication at preconnection, during connection, and postconnection. This will enable prescribers of SIP services to control who can identify their locations to approve or disapprove their subsequent connections, and to also set some parameters to determine whether a certain communication can continue or should terminate.