@article {Belaoud2013357, title = {Survey of SIP authentication mechanisms}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {58}, number = {2}, year = {2013}, note = {cited By 0}, pages = {357-365}, abstract = {In recent years Voice over Internet Protocol (VoIP) has become a popular NGN (Next Generation Network) technology. As this technology is built on internet protocol it is affected by a critical security problems. The Session Initiation Protocol (SIP) is considered as the most used signaling protocol for calls over the Internet for establishing, maintaining and terminating VoIP calls. The security of SIP is becoming more and more important. The prime security service required by SIP is authentication. This paper focuses on the SIP security mechanisms of authentication. We survey the newly proposed methods of authentication then we proceed to evaluate these methods in view of security efficiency and computational cost. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84890889665\&partnerID=40\&md5=350ed13308e43f7e4915fd0fd863b414}, author = {Belaoud, H.a and El Abbadi, J.a and Habbani, A.b} }