Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Detection and Prevention Mechanism on Call Hijacking in VoIP System

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 6
Year of Publication: 2014
Amruta Ambre
Narendra Shekokar

Amruta Ambre and Narendra Shekokar. Article: Detection and Prevention Mechanism on Call Hijacking in VoIP System. International Journal of Computer Applications 90(6):26-30, March 2014. Full text available. BibTeX

	author = {Amruta Ambre and Narendra Shekokar},
	title = {Article: Detection and Prevention Mechanism on Call Hijacking in VoIP System},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {90},
	number = {6},
	pages = {26-30},
	month = {March},
	note = {Full text available}


VoIP (Voice over Internet Protocol) enables user to make calls through internet. VoIP system is popular because of its rich features. VoIP uses Session Initiation Protocol for initialization, termination and tearing down of a session between two communicating entities. Due to its rich features VoIP has received wide acceptance and becoming one of the mainstreams in communication network, increased use of this includes scams and security concerns. Vulnerabilities in the SIP protocol enable hackers to inject control signals and hijack calls. Hence assuring the identities of the communicating entities is essential. Many authentication schemes were proposed for SIP from time to time. Strong authentication scheme can identify the potential threats. This paper proposes the authentication scheme between two end points in order to overcome the limitations of the existing authentication scheme.


  • Arkko J, et al. Security mechanism agreement for SIP sessions. IETF Internet draft, June 2002.
  • Rosenberg J. , Schulzrinne H. , and Camarillo G. , Johnston A. , Peterson J. , Sparks R. , Handley M. and Schooler E. SIP: Session Initiation Protocol. RFC 3261, IETF. The Network Working Group, June 2002.
  • Veltri L, Salsano S, Papalilo D. SIP security issues: the SIP authentication procedure and its processing load. IEEE Network; pp. 16 (6):38e44, 2002.
  • Franks. et al . HTTP Authentication: Basic and Digest Access Authentication. RFC 2617, June 1999.
  • Jonathan Rosenberg, Henning Schulzrinne, Gonzalo Camarillo, Alan Johnston, Jon Peterson, Robert Sparks, Mark Handley and Eve Schooler. SIP: Session Initiation Protocol. RFC 3261 (Proposed Standard), June 2002. Updated by RFCs 3265, 3853, 4320, 4916, 5393, 5621, 5626, 5630, and 5922
  • Qi Qui. Study of Digest Authentication, December 2003
  • Peterson J. Session Initiation Protocol (SIP) Authenticated Identity Body (AIB) FormatRFC 3893, IETF Network Working Group, September 2004.
  • Yang. C. C. , Wang. R. C. , Liu. W. T. "Secure authentication scheme for session initiation protocol'', Computers & Security, vol. 24, pp. 381-386, 2005.
  • Durlanik A, and Sogukpinar I. "SIP authentication scheme using ECDH," World Enformatika Society Transaction on Engineering Computing and Technology, vol. 8, pp. 350-3, 2005
  • D. Conference on Complex, Intelligent and Software Intensive Systems, pp. 549-553, 2009.
  • Santhosh Baboo. S, and Gokulraj K. "A Secure Dynamic Authentication Scheme for Smart Card based Networks," International Journal of Computer Applications, vol. 11, no. 8, pp. 5-12, 2010.
  • Y. P. Liao and S. S. Wang, "A new secure password authenticated key agreement scheme for SIP using self certified public keys on elliptic curves," Computer Communications, vol. 33, pp. 372-380,2010
  • Bellovin, S. M. , Merritt, M (1992). Encrypted key exchange: password-based protocols secure against dictionary attacks, IEEE symposium on research in security and privacy, p. 72-84.
  • Butcher, X. Li, and J. Guo, Members IEEE, "Security challenge and defense in VoIP infrastructures," IEEE Transactions on Systems, Man, and Cybernetics part C: Applications and Reviews, vol. 37, no. 6, pp. 1152-1162, November 2007.
  • Prtrik Park "VoIP Threats Taxonomy" CISCO Press, 24 Sept 2008.
  • Tsai. J. L. "Efficient nonce-based authentication scheme for session initiation protocol, "International Journal of Network Security, vol. 8, no. 3, pp. 312-6, May. 2009.
  • E. J. Yoon and K. Y. Yoo, "A new efficient authentication scheme for session initiation protocol," International