Vous êtes sur la page 1sur 8

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:10 No:02 60

Comparison of Online Charging Mechanisms for SIP Services


Abdelrhman Ahmed1, Sherif Khattab2, Khaled Mostafa2, and Salwa El-Gamal2
1
Faculty of Computers & Information, Fayoum University, Fayoum, Egypt
2
Faculty of Computers & Information, Cairo University, Cairo, Egypt
1
aas03@fayoum.edu.eg
2
{s.khattab, k.mostafa, s.elgamal}@fci-cu.edu.eg

Abstract—Session Initiation Protocol (SIP) has been adopted as: the service provider needs to check the user account
by telecom Next Generation Networks (NGN) and 3rd balance before accepting a service request. Also the service
Generation Partnership Project’s IP Multimedia Subsystem provider needs to monitor the customer’s transactions to
(IMS). Charging is one of the most fundamental components of take the proper action when the customer account balance is
any commercial SIP service.
Service providers have to employ an online charging
about to reach zero. Secondly, online charging mechanism
mechanism to support the prepaid payment model and to allows service providers to create flexible pricing policies
create flexible pricing policies that interwork with customers in that interwork with customers in real-time, to achieve
real-time, to achieve marketing targets while improving marketing targets while improving customer experience. For
customer experience. example, the service provider can provide an extra option to
In this paper, we discuss the requirements of online the user for free while the session is running if the session
charging mechanisms for SIP services, investigate the existing charge reaches a certain threshold.
online charging mechanisms for SIP services namely AAA- SIP background. SIP [6] is an application layer signaling
based and SIP-based, and compare between them according to protocol specified by the Internet Engineering Task Force
their security, performance, supported charging services, and
supported service access types.
(IETF) [7]. SIP is mainly designed for initiation,
Our contributions are: (1) comparing between AAA-based modification, and termination of interactive sessions.
and SIP-based online charging mechanisms, (2) checking the SIP can operate with other application layer protocols
vulnerability of the AAA-based online charging mechanism to including Real-Time Transport Protocol (RTP) [8] and
charging attacks implemented by R. Zhang et al. on Vonage Session Description Protocol (SDP) [9] to provide various
and AT&T VoIP service providers, (3) identifying new security real-time multimedia services [10], such as Voice over
attacks against the latest SIP-based online charging mechanism Internet Protocol (VoIP), multi-party conferences, Internet
–SIPCoin–. Protocol Television (IPTV), and instant messaging (IM).
Currently, due to its many favorable features including
Index Terms—AAA, charging, micro-payment, SIP simplicity and extensibility, SIP has been adopted by
telecom Next Generation Networks (NGN). NGN is a
1. Introduction packet-based network able to provide services including
By 2012, ABI Research expects that almost half of all telecommunications services. Also 3rd Generation
telecom users will be using at least one SIP service. This Partnership Project (3GPP) [11] adopts SIP at IP
will generate over $150 billion in service revenue annually Multimedia Subsystem (IMS). IMS is an architectural
[1]. Charging is one of the most fundamental components of framework for delivering internet protocol multimedia
any commercial SIP service. Indeed, accurate charging will services.
boost the trustworthiness and popularity of SIP services. In this paper, we discuss the requirements of online
Moreover, charging plays an important role in charging mechanisms for SIP services, investigate the
merchandising and marketing by enabling a wide variety of existing online charging mechanisms namely AAA-based
services such as marketing promotions. and SIPCoin –the latest SIP-based mechanism–, and
In some places, especially the developing countries, the compare between them according to their security;
prepaid model is the dominant payment model [2]. performance; supported charging services; and supported
According to Informa Telecoms & Media, during 2007 and service access types.
into 2008, the market for prepaid mobile services has The AAA-based online charging mechanism is based on
continued to grow more than twice as fast as the postpaid the Authentication, Authorization and Accounting (AAA)
market. At the end of 2007, there were 2.33 billion prepaid architecture and consists of the Diameter SIP application
subscriptions in the world, generated revenues of $241.9 and the Diameter credit-control application. While SIPCoin
billion. Informa Telecoms & Media predicts that by 2013 is a peer-to-peer online charging mechanism based on SIP
there will be 3.93 billion prepaid subscriptions, generating and the hash-chain micro-payment technique.
revenues of $382.2 billion [3]. We can summarize the comparison of the two charging
An online charging mechanism charges customers in real- mechanisms in the following points. (1) Both AAA-based
time where charging information can affect, in real-time, the and SIPCoin mechanisms are vulnerable to attacks by
service offered and therefore a direct interaction of the untrusted intermediate parties in absence of end-to-end
charging mechanism with the service control is required [4]. security, but they have their end-to-end security techniques
The telecom industry has achieved overwhelming success to mitigate such attacks. (2) SIPCoin has higher efficiency
through commercial applications of the online charging and scalability than AAA-based mechanism. (3) AAA-based
mechanism [5]. mechanism supports more charging services than SIPCoin.
The benefits of online charging are twofold. Firstly, (4) AAA-based mechanism supports only subscription-
service providers have to employ an online charging based service access type, while SIPCoin supports both
mechanism to support the prepaid model requirements such subscription-based and pay-per-use service access types.
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:10 No:02 61
The rest of this paper is organized as the following. 3. AAA-based online charging mechanism for
Section 2 discusses the requirements of online charging SIP services
mechanisms for SIP services. In Section 3, we investigate
the AAA-based online charging mechanism. Section 4 In this section, we summarize previous work towards
investigates SIPCoin, the latest SIP-based online charging building online charging mechanism for SIP services based
mechanism. A comparison between the two online charging on the Authentication, Authorization and Accounting
mechanisms, according to their security, performance, (AAA) architecture. The AAA-based online charging
supported charging services, and supported service access mechanism consists of the Diameter SIP application and the
types can be found in Section 5. Finally, Section 6 Diameter credit-control application, in what follows we
concludes the paper. present both of them.
IETF AAA working group puts standards for
2. Requirements of online charging authentication, authorization and accounting solutions for
mechanisms for SIP services Internet [18]. They presented Diameter Base protocol [19] –
also referred to as Diameter–, the IETF standard for AAA in
In this section, we will discuss the requirements of online
IP networks and Internet [20], which is defined in RFC
charging mechanisms for SIP services.
3588. The 3GPP has selected Diameter to provide AAA
Real-time. First, Online charging mechanism must be
functionalities.
real-time with negligible delay as SIP services are based on
Diameter is defined as a base protocol which is used in
real-time multimedia communication [12].
conjunction with a set of applications. It is designed as a
Secure. Second, R. Zhang et al. presented four attacks on
peer-to-peer protocol and uses the client/server architecture
SIP-based VoIP systems that target either charge users for
for message exchange between Diameter nodes [21].
sessions established by attackers, or overcharge users for
Diameter addresses the issues of the previously used AAA
their sessions [13].
protocol, Remote Authentication Dial In User Service
Flexible charging mechanism. Third, service providers
(RADIUS) [22].
should support flat rate, time, volume, and session-based
The AAA working group presented the Authentication,
charging [14]. For example, most VoIP providers use simple
Authorization and Accounting requirements for SIP in RFC
pricing models where calls over Internet are charged using
3702 [23]. Then the Diameter SIP application was presented
flat rate and calls that terminate in Public Switched
in RFC 4740 [24]. The Diameter SIP application discusses
Telephone Network (PSTN) are charged in a time-based
how a SIP implementation can use the AAA architecture to
fashion, while other services such as E-Learning services
support authentication, authorization and accounting.
may be charged in a session-based fashion.
Although the Diameter SIP application supports only SIP
Scalable. Fourth, scalability can be improved by
user agents and proxies that use HTTP digest authentication
eliminating the need for establishing a direct trust-
[25], it can be extended to adopt other authentication
relationship between the customer and the service provider
mechanisms supported by SIP [1] such as IP Security
[14]. As the customer may use different services provided
(IPSec) [26], Secure Multipurpose Internet Mail Extensions
by different providers, then for more efficiency and
(S/MIME) [27], Transport Layer Security (TLS) [28] and
scalability, it is recommended to use a trusted third party for
Datagram Transport Layer Security (DTLS) [29].
the customer and the service provider rather than forcing the
Diameter SIP application can collect charging
service provider to establish a direct trust-relationship with
information while the SIP session is running but cannot
each one of its customers.
provide online charging. To address this issue, the Diameter
Optimized for low-valued transactions [14]. Fifth, service
Credit-Control application implements online charging for a
providers provide access to SIP services through
variety of end user services [17].
subscription and pay-per-use. Customers usually prefer pay-
per-use to pay only for their usage and to have freedom to 3.1 Architecture model
move from one service provider to another [15].
Pay-per-use systems require support of low-valued In this subsection, we present the architecture model of
transactions. Credit cards or e-checks cannot be used for the AAA-based online charging mechanism for SIP
low-valued transactions; they add a time delay and increase services.
the processing costs. Therefore, Micro-payment techniques As depicted in Figure1, the startup is when the end user
are the proper choice; they are designed especially for requests a service from the service provider. The service
payments of small amounts ranging from one cent to several provider authenticates and authorizes the user through the
dollars [16]. AAA server using the Diameter SIP application. When
Get offer prior to session establishment. Sixth, SIP is able online charging is required, the credit-control client interacts
to provide different real-time multimedia services with with the credit-control server using the Diameter credit-
different options. A customer needs to get an offer from the control application. Details of this interaction will be
service provider prior to session establishment [14], and presented in the next subsection.
based on his account balance or a service-specific criterion The credit-control server keeps track of users’ accounts.
approves the offer with certain options or rejects it Upon request from the credit-control client, the credit-
completely. control server reserves a quota of service units from the
Ability to debit as well as credit the user account. user’s account and reports the granted service units to the
Seventh, there are services such as gaming and advertising credit-control client. The credit-control client monitors the
that may credit as well as debit the user account [17]. usage of granted service units, requests more units when the
granted units are about to be exhausted and reports to the
credit-control server the actual number of used units to debit
from the user's account.
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:10 No:02 62
End End At expiry of the granted quota, the credit-control client
User User sends an update request to the credit-control server to report
the used units and request new quota (9). The credit-control
Diameter SIP &
server debits the used units from the user's account, reserves
Service Provider Credit-Control AAA Server
new quota and reports back to the credit-control client (10).
applications
At session termination (24 and 25), the credit-control
Credit-Control Diameter Credit- Billing client sends a termination request containing the used units
Client Control application System to the credit-control server (26). The credit-control server
debits the used units from the user's account, terminates the
Diameter Credit- Credit-Control credit-control session and acknowledges the credit-control
Control application Server client (27).
Figure1. Architecture model for AAA-based mechanism (This Graceful Service Termination. While session is running,
figure is a modified version of Figure1 in [17], to be adapted to
SIP services.) the credit-control server debits the used units from the user's
account, and reserves a new quota, if the user's account
The service fee may be calculated by the credit-control balance reaches zero, then the new quota is reported back to
client and included in the credit request or left to the credit- the credit-control client combined with an indicator that this
control server to calculate it. is the final quota and the action to be taken after exhaust of
3.2 Message flow this final quota, in this example, the action is to redirect the
user to the Top-Up server to replenish his account (12).
Figure2 presents the message flow for the Diameter SIP At expiry of the final allocated quota, the credit-control
application and Diameter credit-control application to client sends an update request to the credit-control server to
provide authentication and authorization; advice of charge; report the used units (13), and puts the session on hold (14).
session credit-control; and graceful service termination [17]. The credit-control server debits the used units from the
Authentication and Authorization. User sends a Register user's account and sends to the credit-control client the
request to the configured SIP registrar (1). The SIP proxy validity time that represents how long does the user have to
sends a request using the Diameter SIP
application to the AAA server to Caller SIP Proxy / Registrar AAA Server
Top-Up
Callee Credit-Control
authenticate and authorize the user (2). Credit-Control Client Server Server
Advice of Charge (AoC). Caller 1. Register 2. Authentication
sends a service request (3). SIP proxy & Authorization
detects that the caller is subscribed to 3. Invite
AoC service, then sends a diameter 4. Credit-Control Request (Price Enquiry)
credit-control request including session 5. Credit-Control Answer (Cost)
information to the credit-control server
to rate the requested service (4). The 6. Credit-Control Request (Initial)
credit-control server sends the service 7. Credit-Control Answer (Granted-Units)
cost to the SIP proxy (5). The SIP
proxy sends the caller an AoC web 8. Invite
page contains the session information
9. Credit-Control Request (Update, Used-Units)
collected from SIP signaling and
Session Description Protocol (SDP) 10. Credit-Control Answer (Granted-Units)
attributes, the cost information, and a
11. Credit-Control Request (Update, Used-Units)
button to accept or reject the service.
Session Credit-Control. When the 12. Credit-Control Answer (Final-Unit, Redirect)
SIP proxy receives a service request –
and after the caller accepts the service 13. Credit-Control Request (Update, Used-Units)
cost if he is subscribed to AoC service– 14. Put on hold
and the online charging is required, the 15. Credit-Control Answer (Validity Time)
credit-control client sends a request to 16. Invite 17. Invite
the credit-control server to initiate a 18. Replenish account
credit-control session (6). The session-
initiation request contains session 19. Bye
20. Bye
information collected from SIP
signaling and SDP attributes. The 21. Credit-Control Request (Update)
credit-control server checks the user's 22. Credit-Control Answer (Granted-Units)
account balance, rates the service –if 23. Put off hold
service fee has not been reported at the
credit-control client request–, and 24. Bye
reserves quota of service units from the 25. Bye
user's account. The granted quota is 26. Credit-Control Request (Termination, Used-Units)
reported back to the SIP proxy (7), and 27. Credit-Control Answer
then the SIP proxy forwards the service
request to callee (8). Figure2. Simplified message flow for Diameter SIP application and Diameter credit-control
application to provide online charging.
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:10 No:02 63
replenish his account (15). Customer Service Provider Payment Provider
SIP proxy starts a session between the user and the Top- 1. Invite
Up server where user is to be asked for a credit card number 2. Offer
and an amount of money to replenish his account (16, 17,
and 18). After account replenish or at expiry of validity 3. Withdrawal Request
time, the credit-control client sends an update request to 4. Withdrawal Response
check whether the account has been replenished or not (21).
5. Withdrawal
If account has been replenished, the credit-control server Response
reports back the granted units and the SIP proxy puts the 6. Initial Payment
session off hold (22 and 23); otherwise SIP proxy terminates
the session. SIP Service

4. SIPCoin mechanism 7. Increment


Payment Request
In this section, we present the latest SIP-based online 8. Increment
charging mechanism for SIP services that called SIPCoin. Payment
The SIP-based online charging mechanism was first SIP Service
introduced in 2004 through an Internet draft [14] by IETF
9. Bye
SIP Protocol Investigation (SIPPING) working group [30]
to overcome some of the limitations of the AAA-based 10. Redemption
online charging mechanism, it is a peer-to-peer (P2P) micro- Request
payment mechanism based on the Security Assertion Figure3. SIPCoin message flow. (This figure is a simplified version
of Figure2 in [7], simplification is only for presentation purpose)
Markup Language (SAML) [31].
SIPPING online charging mechanism employs a payment including the order identity and the service provider's
provider as a Trusted-Third-Party (TTP) for the customer identity (3).
and the service provider. Therefore, customer and service The payment provider verifies the service provider
provider do not need to have any direct trust-relationship identity, and then generates the required SIP coins as a hash
with each other. Also the mechanism is P2P which improves chain –using “(1)”– (4). Then the payment provider sends to
the scalability and efficiency of the mechanism. the customer the hash function (HC), and both the root (WN)
J. Hao et al. [12] found two drawbacks in the SIPPING and the anchor (W0) of the hash chain. The customer
mechanism. First, SAML introduces complexity to payment regenerates the hash chain by hashing the received root
messages and payment flow, thus increases overhead on (WN) N times, and verifies the SIP coins by comparing the
service and payment providers and makes it difficult to meet calculated anchor to the received one (W0).
the real-time requirement. Second, payment provider has to
Wi = HC (Wi+1) where i = N – 1, N – 2...0 (1) in [12]
participate in each payment, which affects scalability as the
payment provider may become a bottle-neck. Stage 3: Payment. In this stage, the customer pays the
SIPCoin is a P2P online charging mechanism based on service fee to the service provider.
the hash-chain micro-payment technique [16]. SIPCoin [12] In order to enable the service provider to verify the
is introduced to address the two drawbacks of the SIPPING customer's payment, the payment provider sends to the
mechanism. SIPCoin does not use SAML and the payment service provider the hash function (HC), the anchor of the
provider does not have to participate in each payment, hash chain (W0), and the customer identity (5).
improving both efficiency and scalability and meeting the The customer sends a payment to the service provider to
real-time requirement. SIPCoin creates P2P market for real- pay the service's initial cost (6). The message includes the
time communication services. payment provider identity, a hash value (WI), and its index
Figure3 presents SIPCoin message flow, which can be (I) in the hash chain. For example, if initial payment is ten
divided into four stages: (1. Offer) the service provider cents, then (WI) is the tenth value in the hash chain.
presents an offer to the customer; (2. Withdrawal) the The service provider verifies the payment by hashing
customer withdraws SIP coins from the payment provider; (WI), (I) times using (HC) hash function, and comparing the
(3. Payment) the customer pays the service provider; and (4. calculated anchor with the one received before (W0) from
Redemption) the service provider redeems the coins from the payment provider. This verification ensures that the SIP
the payment provider. coins can be only paid to the service provider identified at
Stage 1: Offer. In this stage, the service provider presents the withdrawal request.
an offer to the customer. When the paid service is about to be exhausted, the
The customer sends a request to the service provider (1). service provider requests an increment payment from the
The service provider sends an offer to the customer customer (7).
including order identity, supported currencies, supported The customer sends a payment to the service provider to
payment providers, service initial cost, and service-unit cost pay the service-unit cost (8). The message includes the
(2). For free sessions, like calls over Internet that are payment provider identity, a hash value (WX) and its index
charged by monthly flat rate, there is no a payment message (X) in the hash chain, where I < X ≤ N. The service provider
nor interaction with the payment provider. verifies the payment by hashing (WX), (X-I) times using
Stage 2: Withdrawal. In this stage, the customer (HC) hash function, and comparing the result with the
withdraws SIP coins from the payment provider. previous received hash value from the customer (WI).
The customer chooses both currency and payment Messages 7 and 8 can be repeated until session end. If the
provider that are supported by the service provider and coins withdrawn using the message 3 have been exhausted,
sends a request to withdraw an amount of SIP coins then the customer sends a withdrawal request to the
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:10 No:02 64
payment provider; otherwise the service provider terminates Caller MITM1 SIP Proxy MITM2 Callee
the session. 1. Invite
Stage 4: Redemption. In this stage, the service provider 2. Proxy Authenticate
redeems the coins from the payment provider. Required
Periodically, the service provider sends a redemption 3. Invite
request to the payment provider including customer identity, (Credentials) 4. Invite
order identity, hash value (WX), and its index (X) in the hash 5. Busy 6. Invite
chain, where X ≤ N. The payment provider verifies the 7. Trying
payment and transfers money into service provider's 8. Trying
9. Ringing
account. 10. Ringing
11. OK
5. Comparison of AAA-based and SIPCoin 12. OK
13. ACK
In this section, we compare the two online charging RTP Stream
mechanisms namely AAA-based and SIPCoin, according to
14. Bye
their security, performance, supported charging services, 15. Bye
and supported service access types. 16. OK
17. OK
5.1 Security Figure4. Message flow of FakeBusy attack. (This figure is a
modified version of Figure6 in [13], modification is only for
In this subsection, we compare the security of the two application to any SIP environment rather than only Vonage and
mechanisms as summarized in Table1. AT&T)
Table1. Existing attacks that can be implemented by untrusted ByeDelay. The attack prolongs the session duration by
intermediate parties in absence of end-to-end security
delaying the service’s termination request –Bye message–.
Mechanisms The attack is launched by two MITMs, one stands between
AAA-based SIPCoin
Attacks the caller and the SIP proxy, and the other stands between
Availability 2 3 the callee and the SIP proxy. After delaying the Bye
Eavesdropping 3 3 message, the two MITMs can exchange the RTP packets
Man-In-The-Middle (MITM) 3 3 rather than the session intended participants.
Replay 2 2 The attack message flow is depicted in Figure5. Call is
FakeBusy 3 2 established properly (1 - 11). When any of the two
ByeDelay 3 2 participants terminates the session, for example, callee in
Figure5, MITM2 intercepts the Bye message (12), and
Security attacks. In this subsection, we describe the replies with an OK message to inform the callee that the
FakeBusy and ByeDelay attacks presented by R. Zhang et session has been successfully terminated (13). MITM2
al. [13] that charge users for sessions established by reports MITM1 with callee request, and then MITM1 sends
attackers and overcharge users for their sessions, a Bye message to the caller to inform that callee terminated
respectively. R. Zhang et al. presented two more attacks, the session (14). Now the two MITMs can exchange RTP
InviteReplay and ByeDrop. InviteReplay attack can be packets until one of them terminates the session (16 - 19). If
applied only on SIP servers that implement the anti-replay the SIP proxy authenticates the Bye message, MITM2 sends
functionality in the SIP authentication wrongly. ByeDrop the intercepted Bye message sent by the callee, otherwise,
attack can be applied only on SIP servers that don’t MITM2 can generate the Bye message. The caller is
terminate sessions of no RTP activity. overcharged for the session based on the time spent by the
FakeBusy. The attack rejects a user’s service-request, two MITMs.
and then an attacker uses this request to establish a session Caller MITM1 SIP Proxy MITM2 Callee
that will be charged to the user. The attack is launched by 1. Invite
two MITMs, one stands between the caller and the SIP 2. Proxy Authenticate
proxy, and the other stands between the callee and the SIP Required
proxy. 3. Invite
The attack message flow is depicted in Figure4. SIP (Credentials) 4. Invite
proxy authenticates the user’s service-request (1 - 3). 5. Trying
6. Trying
MITM1 intercepts the authenticated request sent to the SIP 7. Ringing
8. Ringing
proxy and modifies the IP address and port number of the 9. OK
RTP stream to its own rather than the caller ones (4). 10. OK
MITM1 sends a fake busy message to the caller to tell him 11. ACK
that the callee is on the phone (5). MITM2 intercepts the RTP Stream
request sent to the callee (6) and replies with Trying (7), 12. Bye
Ringing (9), and OK (11) messages. MITM2 includes his IP 13. OK
address and a chosen port number for the RTP stream in the 14. Bye
OK message. Now the RTP stream is established between 15. OK
RTP Stream
MITM1 and MITM2 while SIP signaling refers to a session
16. Bye
between the caller and the callee. Then the caller will be 17. Bye
wrongly charged for the session. 18. OK
19. OK
Figure5. Message flow of ByeDelay attack.
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:10 No:02 65
Security of AAA-based mechanism. The Diameter Base proxies can run attacks such as the following. First,
protocol [19] requires that messages are secured by using Collection of the volume of customers' transactions, and
IPSec or TLS. TLS is recommended for protection of inter- pricing plans and business volume of the payment providers
domain exchanges, while IPSec for protection of intra- by eavesdropping offer, initial payment, and increment
domain exchanges where IPSec tunnels are pre-established payment messages. Second, Reduction of the service
[24], in what follows we justify these recommendations. provider's revenue by redirecting its customers to another
TLS and IPSec cannot support end-to-end security colluding service provider rather than the intended one. This
between two users that are connected through intermediate can be done by replying a service request with a fake
SIP proxies as intermediate SIP proxies need to parse the response "301 moved permanently" or "302 moved
SIP headers to route the message properly [32]. Therefore temporarily" combined with the colluding service provider
TLS and IPSec support only hop-by-hop security by address, and then the customer sends a new request to the
establishing a secure connection between each two adjacent colluding service provider. Third, dropping initial or
entities on the path between the two end users. At call increment payment messages leading to that the service
establish, time required to establish IPSec tunnels between provider terminates the service. Fourth, modification of SIP
each hop is much higher than the industry-acceptable call coins in initial or increment payment messages, but when
setup time which is 250 milliseconds [32]. Therefore IPSec the service provider verifies the payment, it will reject the
is feasible where IPSec tunnels are pre-established and is payment and terminate the service. Fifth, Increasing initial
impractical for dynamically allocated sessions. or unit costs in the service provider’s offer overcharges the
When untrusted third-party relay or proxy agents are customer. The service provider can resolve the attack by
involved –relay agents route messages while proxy agents refunding extra payment to the customer but the customer
may modify messages to enforce policies– the TLS or IPSec will not trust the service provider any more.
hop-by-hop mechanism does not provide sufficient security SIPCoin is neither vulnerable to FakeBusy nor ByeDelay
for credit-control sessions [17]. as payment is handled directly with the caller. For FakeBusy
Therefore the credit-control sessions will be vulnerable to attack, caller pays only an initial payment and service
attacks such as the following. First, eavesdropper can collect provider will refund it as session has not been established
the volume of customers' transactions, and pricing plans and because callee is on the phone. For ByeDelay attack, caller
business volume of the credit-control servers [17]. Second, does not pay any more increment payment once session has
Malicious modification, injection, or deletion of service been terminated by caller or callee.
specific Attribute-Value pairs (AVPs) –service specific End-to-end security for all payment messages exchanged
AVPs contain service attributes and are used to rate the between the customer and the service provider can mitigate
service– or complete credit-control messages lead to the previous attacks. Also the communication between the
financial consequences [17]. Third, FakeBusy attack charges service provider and the payment provider must employ
customers for sessions established by attackers. Fourth, end-to-end security to protect withdrawal response and
ByeDelay attack overcharges customers for their sessions. redemption request messages.
To mitigate the previous attacks, provide end-to-end
security by employing the Diameter Cryptographic Message 5.2 Performance
Syntax (CMS) Security Application [33]. In this subsection, we compare the performance of the
The diameter credit-control application mitigates two mechanisms.
application-layer replay attack by employing Session-Id
defined in the Diameter Base protocol, and the credit- Efficiency. SIPCoin is more efficient than AAA-based
control request-number defined in the Diameter credit- mechanism in terms of processing and network traffic. In
control application [17]. AAA-based mechanism, the credit-control server must
participate in each payment. While in SIPCoin, the payment
Security of SIPCoin mechanism. SIPCoin employs provider does not have to participate at each payment. This
S/MIME to provide end-to-end confidentiality, integrity, not only reduces the number of payment messages between
authentication, and replay protection for the communication the customer and the payment provider, but also reduces the
between the customer and the payment provider. It also SIPCoin’s usage frequency of S/MIME.
employs TLS to provide hop-by-hop protection for the
communication between the customer and the service Scalability. SIPCoin is more scalable than AAA-based
provider [12]. mechanism in terms of the architecture model and the
J. Hao et al. suggested the use of S/MIME to provide the management of trust relationship between involved parties.
confidentiality and integrity protection for the important Since the customer may use different services provided by
messages of the payment message flow according to the different providers, in AAA-based mechanism, each service
demands [12]. But, they did not clarify which payment provider must authenticate and authorize its customers
messages are important and which are not, in what follows against the AAA server. While in SIPCoin, no need to have
we discuss the protection of all payment messages. a direct trust-relationship between the service provider and
End-to-end protection for the communication between the each one of its customers; SIPCoin uses a trusted third party
customer and the payment provider protects withdrawal for the customer and the service provider.
requests and responses so that attackers can neither steal SIP In AAA-based mechanism, the service fee is calculated
coins nor gain services from the service provider on behalf by the credit-control client, or service- specific parameters
of legitimate customers [12]. are passed to the credit-control server to calculate the fee.
Hop-by-hop protection for the communication between While in SIPCoin, the service fee is determined by the
the customer and the service provider does not provide service provider without the need to contact another entity.
sufficient protection leading to that untrusted intermediate Finally, SIPCoin is based on the scalable peer-to-peer
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:10 No:02 66
architecture, while AAA-based mechanism is based on the References
client-server architecture.
[1] SIP Services Will Generate $150 Billion in Annual Revenue
5.3 Supported charging services by 2012. Available: http://www.abiresearch.com/press/987-
SIP+Services+Will+Generate+%24150+Billion+in+Annual+
In this subsection, we compare the two mechanisms Revenue+by+2012
according to their support of charging services as [2] "Prepaid Charging Is Graduating to a Starring Role in
summarized in Table2. Interactive Services,” Telcordia Technologies, 2009.
Before comparison, we define two charging services. [3] J. Middleton, "Prepaid outstrips postpaid two to one,”
Firstly, direct debit, There are certain services that always Informa Telecoms & Media, October 2008.
succeed but may encounter long delay between the service [4] "3GPP Telecommunication management; Charging
management; Online Charging System (OCS): Applications
invocation and the actual service delivery. For more
and interfaces,” 3GPP TS 32.296, September 2009.
efficiency, such services can be charged by direct debiting at [5] W. Wei, "Online Charging--Get ready for convergent
service delivery rather than establishing a credit-control billing,” Huawei Communicate, Issue 40, 2008.
session from the service invocation until the service delivery [6] J. Rosenberg, et al., "SIP: Session Initiation Protocol,” IETF,
[17]. Instant messaging is an example for such services, RFC 3261, June 2002.
there may be long delay between sending a message and its [7] Internet Engineering Task Force. Available:
retrieval by the recipient. Secondly, refund, Service provider http://www.ietf.org
may refund service-units or monetary amount to the [8] H. Schulzrinne, et al., "RTP: A Transport Protocol for Real-
customer’s account; for example, the customer pays for the Time Applications,” IETF, RFC 3550, July 2003.
[9] M. Handley, et al., "SDP: Session Description Protocol,”
service but the service provider fails to deliver the service.
IETF, RFC 4566, July 2006.
Table2. Supported charging services by AAA-based and SIPCoin [10] H. Sinnreich and A. B. Johnston, "Internet Communications
mechanisms Using SIP: Delivering VolP and Multimedia Services with
Mechanisms AAA- Session Initiation Protocol,” Second ed: Wiley Publishing,
SIPCoin 2006, p. 18~33.
Charging Services based
[11] 3rd Generation Partnership Program (3GPP). Available:
Credit Reservation 3 3 http://www.3gpp.org
Initial & Increment Payments 3 3 [12] H. Jianguo, et al., "A Real-Time Payment Scheme for SIP
Balance Check 3 2 Service Based on Hash Chain,” presented at the IEEE
Direct Debit 3 2 International Conference on e-Business Engineering, ICEBE
Refund 3 2 '08., 2008.
[13] R. Zhang, et al., "Billing attacks on SIP-based VoIP
Graceful Service Termination 3 2 systems,” presented at the Proceedings of the first USENIX
5.4 Supported service access types workshop on Offensive Technologies, Boston, MA, 2007.
[14] C. Jennings, et al., "Payment for Services in Session
AAA-based mechanism supports only subscription-based Initiation Protocol (SIP),” draft-jennings-sipping-pay-06,
service access type, while SIPCoin supports both July 2007.
subscription-based and pay-per-use service access types [15] A. Ruiz-Martinez, et al., "SIP extensions to support
(micro)payments,” in Advanced Information Networking and
then it appeals to a wider range of customers.
Applications, 2007. AINA '07. 21st International Conference
6 Conclusion on, 2007, pp. 289-296.
[16] A. Nguyen and X. Shao, "A Secure and Efficient
In this paper, we discuss the requirements of online Micropayment System,” in SCSS (1), 2007, pp. 63--67.
charging mechanisms for SIP services, investigate the [17] H. Hakala, et al., "Diameter Credit-Control Application,”
existing online charging mechanisms for SIP services IETF, RFC 4006, August 2005.
namely AAA-based and SIPCoin, and compare between [18] IETF Status Pages, Authentication, Authorization and
them according to their security; performance; supported Accounting services. Available: http://tools.ietf.org/wg/aaa
[19] P. Calhoun, et al., "Diameter Base Protocol,” IETF, RFC
charging services; and supported service access types.
3588, September 2003.
We can summarize the comparison of the two charging [20] S. Decugis, "Towards a Global AAA Framework for
mechanisms in the following points. (1) Both AAA-based Internet,” in Applications and the Internet, 2009. SAINT '09.
and SIPCoin mechanisms are vulnerable to attacks by Ninth Annual International Symposium on, 2009, pp. 227-
untrusted intermediate parties in absence of end-to-end 230.
security, but they have their end-to-end security techniques [21] P. Thermos and A. Takanen, "Securing VoIP Networks:
to mitigate such attacks. (2) SIPCoin has higher efficiency Threats, Vulnerabilities, and Countermeasures,” First ed:
and scalability than AAA-based mechanism. (3) AAA-based Addison-Wesley Professional, 2007, p. 270~280.
mechanism supports more charging services than SIPCoin. [22] C. Rigney, et al., "Remote Authentication Dial In User
Service (RADIUS),” IETF, RFC 2865, June 2000.
SIPCoin needs to incorporate services such as, balance
[23] J. Loughney and G. Camarillo, "Authentication,
check, direct debit, refund, and graceful service termination. Authorization, and Accounting Requirements for the Session
(4) AAA-based mechanism supports only subscription- Initiation Protocol (SIP),” IETF, RFC 3702, February 2004.
based service access type, while SIPCoin supports both [24] M. Garcia-Martin, et al., "Diameter Session Initiation
subscription-based and pay-per-use service access types. Protocol (SIP) Application,” IETF, RFC 4740, November
Future research will evaluate SIPCoin’s effect on SIP 2006.
performance, and incorporate missing charging services into [25] J. Franks, et al., "HTTP Authentication: Basic and Digest
SIPCoin. Access Authentication,” IETF, RFC 2617, June 1999.
[26] S. Kent and K. Seo, "Security Architecture for the Internet
Protocol,” IETF, RFC 4301, December 2005.
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:10 No:02 67
[27] B. Ramsdell, "Secure/Multipurpose Internet Mail Extensions
(S/MIME) Version 3.1 Message Specification,” IETF, RFC
3851, July 2004.
[28] T. Dierks and E. Rescorla, "The Transport Layer Security
(TLS) Protocol Version 1.2,” IETF, RFC 5246, August 2008.
[29] E. Rescorla and N. Modadugu, "Datagram Transport Layer
Security,” IETF, RFC 4347, April 2006.
[30] IETF SIPPING working group. Available:
http://tools.ietf.org/wg/sipping
[31] P. Madsen and E. Maler, "SAML v2.0 Executive Overview,”
OASIS SSTC Committee, sstc-saml-exec-overview-2.0-cd-
01, April 2005.
[32] P. Thermos and A. Takanen, "Securing VoIP Networks:
Threats, Vulnerabilities, and Countermeasures,” First ed:
Addison-Wesley Professional, 2007, p. 165~193.
[33] P. R. Calhoun, et al., "Diameter CMS Security Application,”
draft-ietf-aaa-diameter-cms-sec-04, March 2002.

Vous aimerez peut-être aussi