A Study on VoIP Information Security for Vocie Security based on SIP

  • Sung, Kyung (Department of Computer Education, Mokwon University)
  • Published : 2008.03.31

Abstract

The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eaves-drop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.

Keywords

References

  1. K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, G. Zorn, "Point-to-Point Tunneling Protocol (PPTP)", RFC 2637, July 1999
  2. W. Simpson, "The Point-to-Point Protocol (PPP)", RFC 1661, July 1994
  3. W. Simpson, "PPP LCP Extensions", RFC 1548, January 1994
  4. W. Simpson, "PPP Challenge Handshake Authen-tication Protocol (CHAP)", RFC 1994, August 1996
  5. D. Rand, "The PPP Compression Control Protocol (CCP)", RFC 1962, June 1996
  6. G. McGregor, "The PPP Internet Protocol Control Protocol (IPCP)", RFC 1332, May 1992
  7. G. Pall, G. Zorn, "Microsoft Point-To-Point Encryp-tion (MPPE) Protocol", RFC 3078, March 2001
  8. J. Postel, "Internet Protocol", RFC 760, January 1980