1. Introduction
Voice-over-Ip (VoIP) has experienced a tremendous growth in recent years thanks to its low cost and rich capability in rendering new services. In VoIP networks, the most commonly used protocol is the combination of SIP [1] for signaling and RTP [2] for transmitting voice and/or video. These protocols are standardized by the IETF and perform their required tasks efficiently. Unfortunately, SIP and RTP both lack basic security features including no fundamental proof of identity, no protection from man in the middle or replay attacks, and no assurance of privacy is provided.