

This qualitative study examines privacy practices and concerns among contributors to open collaboration projects. Performance analysis also shows that the proposed scheme is suitable for SIP based communication. In addition to informal security discussions, we give formal security analysis of the proposed scheme under the generic group model of cryptography.

Security analysis shows that the proposed scheme is able to fix the flaws found in Lu et al.’s scheme. Hence, there is a need to propose a secure ECC-based authentication scheme with user anonymity for SIP to overcome the shortcomings of Lu et al.’s scheme. Also, their scheme fails to achieve user anonymity and mutual authentication. In this paper, we show that their scheme is susceptible to the user and server impersonation attacks.

proposed an authentication scheme for SIP-based communications and proved that their scheme can resist various network attacks. In order to ensure the secure communication, several authentication schemes have been proposed for SIP in the literature. A strong authentication scheme plays a pivotal role in safeguarding communications over the Internet. It is also used for initiating, terminating and maintaining the sessions. The session initiation protocol (SIP) is a signaling protocol which is used to controlling communication in the Internet. The result showed that the enriched network with TOR concepts and capabilities provided for a means to create and establish TOR circuits that made it possible to access webserver contents anonymously, a concept that is central to privacy preservation. The network evaluation criteria consisted of paths, open ports, running services, network portability, speed and hardware limitation. The simulation tool was first used to setup an isolated network which was evaluated under varying scenarios, then the isolated network was enriched with the fundamental principles and core capabilities offered by TOR and then investigated under the same scenarios of the original isolated network.

To achieve this objective in an efficient scientific manner, a sequential development, evaluation, analysis and evaluation of a virtual network infrastructure using Netkit-ng simulation was undertaken. And to contribute towards mitigating this concern, this study investigated the extent to which The Onion Router (TOR) concepts and capabilities can be leveraged as a potential solution. This study observed that there is a growing privacy concerns in online interaction, most especially as the word is on the verge of becoming a surveillance state.
