• Title/Summary/Keyword: Voice over internet protocol

Search Result 159, Processing Time 0.02 seconds

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

Design and Implementation of SIP UA for CPL process (CPL 처리를 위한 SIP UA 확장 설계 및 구현)

  • 이일진;정옥조;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.758-761
    • /
    • 2002
  • Voice of U(VoIP) technology Provides voice service as well as data service via Internet. It has been a promising technology as Internet grows fast and the requirements are increasing. Recently, serveral protocols have been created to allow telephone calls to be made over IP networks, notably, SIP and H.323. Due to introducing SIP and H.323, There are many change at internet telephony service. Internet telephony enables a wealth of new service possibility Users can control telephony service directly. In this paper, we design and implementation CPL client based on SIP system.

  • PDF

VoIP Planning and Evaluation through the Analysis of Speech Transmission Quality Based on the E-Model (E-모델 기반 통화 품질 분석을 통한 VoIP Planning 및 평가)

  • Bae Seong Yong;Kim Kwang Hoon
    • Journal of Internet Computing and Services
    • /
    • v.5 no.6
    • /
    • pp.31-43
    • /
    • 2004
  • Voice over Internet Protocol (VoIP) is currently a popular research topic as a real time voice packet transmission method. But current Internet environment do not guarantee the quality of voice when we take a side view of delay, jitter and loss. Up to now, many voice based evaluation algorithms have been used to measure speech quality of VoIP systems. However, these algorithms have the defects that their results are different according to voice samples and some algorithms can not take network environment for speech transmission path. The E-model can be used to solve the problems of these algorithms. In this paper. we introduce VoIP planning guidelines through the various analysis of E-model which can model impairments of network quality as well as VoIP equipment quality systematically, We, also, show the evaluation method and results of speech transmission quality.

  • PDF

An Improved Authentication and Key Agreement scheme for Session Initial Protocol

  • Wu, Libing;Fan, Jing;Xie, Yong;Wang, Jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4025-4042
    • /
    • 2017
  • Session initiation protocol (SIP) is a kind of powerful and common protocols applied for the voice over internet protocol. The security and efficiency are two urgent requirements and admired properties of SIP. Recently, Hamed et al. proposed an efficient authentication and key agreement scheme for SIP. However, we demonstrate that Hamed et al.'s scheme is vulnerable to de-synchronization attack and cannot provide anonymity for users. Furthermore, we propose an improved and efficient authentication and key agreement scheme by using elliptic curve cryptosystem. Besides, we prove that the proposed scheme is provably secure by using secure formal proof based on Burrows-Abadi-Needham logic. The comparison with the relevant schemes shows that our proposed scheme has lower computation costs and can provide stronger security.

A Study of the delay pattern of voice traffic for end-to-end users on the voice IP (VoIP 상에서 다양한 응용 서비스 트래픽에 따른 종단간 사용자의 음성 트래픽 지연 변화 연구)

  • 윤상윤;정진욱
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.2
    • /
    • pp.15-24
    • /
    • 2001
  • In this paper we study the delay patterns of voice traffic for end-to-end users Caused by serving the whole bunch of applications traffic at the same time on the Voice over Internet Protocol (VoIP) network. Given the current situation that voice traffic is served along with other application services on the VoIP network, it is quite necessary to figure out how and by what the voice traffic requiring high QoS is delayed. We compare the delay performance of voice traffic on the VoIP network under FIFO with the one under Weighted Fair Queuing(WFQ), and discover the differences of the delay performance resulting from the use of different voice codec algorithms. The results of our study show that using the voice codec algorithm with a higher coding rate nd the queuing algorithm of WEQ can provide users with high-quality voice traffic.

  • PDF

A Newly Telesecurity of VoIP using SIP protocol in VPN

  • Lee, Sung-Ki;Hwang, Doh-Yeun;Yi, Seung-Ryong;Yu, Seung-Sun;Kwak, Hoon-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1391-1394
    • /
    • 2005
  • The VoIP (Voice over IP) is being used world-widely and already put to practical use in many fields. However, it is needed to ensure the security of VoIP call in special situations. It is relatively difficult to eavesdrop commonly used PSTN network in that a 1:1 circuit connects it. However, it is difficult to ensure the security of a call on Internet because many users are connected to the Internet concurrently. This paper suggests a new model for Internet telephony to prevent eavesdrops, using VoIP (using SIP protocol) with the use the VPN protocol and establish the feasibility of its practical use comparing it with the conventional Internet telephony.

  • PDF

ROSS: Low-Cost Self-Securing VoIP Communication Framework

  • Syafalni, Alfin;Samsudin, Azman;Jaafar, Yazid;Omar, Mohd. Adib
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3366-3383
    • /
    • 2012
  • Reliance on the Internet has introduced Voice over Internet Protocol (VoIP) to various security threats. A reliable security protocol and an authentication scheme are thus required to prevent the aforementioned threats. However, an authentication scheme often demands additional cost and effort. Accordingly, a security framework for known participants in VoIP communication is proposed in this paper. The framework is known as Randomness-Optimized Self-Securing (ROSS), which performs authentication automatically throughout the session by optimizing the uniqueness and randomness of the communication itself. Elliptic Curve Diffie-Hellman (ECDH) key exchange and Salsa20 stream cipher are utilized in the framework correspondingly to secure the key agreement and the communication with low computational cost. Human intelligence supports ROSS authentication process to ensure participant authenticity and communication regularity. The results show that with marginal overhead, the proposed framework is able to secure VoIP communication by performing reliable authentication.

End-to-end Transmission Performance of VoIP Traffics based on Mobility Pattern over MANET with IDS (IDS가 있는 MANET에서 이동패턴에 기반한 VoIP 트래픽의 종단간 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.7
    • /
    • pp.773-778
    • /
    • 2014
  • IDS(Intrusion Detection System) can be used as a countermeasure for blackhole attacks which cause degrade of transmission performance by causing of malicious intrusion to routing function of networks. In this paper, effects of IDS for transmission performance based on mobility patterns is analyzed for MANET(Mobile Ad-hoc Networks), a suggestion for effective countermeasure is considered. Computer simulation based on NS-2 is used in performance analysis, VoIP(Voice over Internet Protocol) as an application service is chosen for performance measure. MOS(Mean Opinion Score), call connection ratio and end-to-end delay is used as performance parameter.

Transmission Performance of VoIP Traffic over MANETs (MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1109-1116
    • /
    • 2010
  • In this paper, some performance characteristics of VoIP(Voice over Internet Protocol) for MANET(Mobile Ad-hoc Networks) with simulation is studied and appropriate condition for implementation of VoIP service is suggested. VoIP simulator is implemented with NS(Network Simulator)-2. VoIP traffic for simulation is generated with some codecs of G.711, G.723.1, G.726-32, G.729A, GSM.AMR and iLBC. As simulation results for traffic transmission under $670{\times}670m$ 50node MANET environment, performance data for MOS(Mean Opinion Score), network delay, packet loss rate and transmission bandwidth are measured. Normalized analysis about measured results shows that maximum VoIP connection satisfying VoIP service quality condition is 15.

Design of Internet Phon(VoIP) System for Voice Security based on VPN (VPN 기반의 음성 보안을 위한 인터넷 텔레포니(VoIP) 시스템 설계)

  • Kim Suk-Hun;Kim Eun-Soo;Song Jung-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.942-949
    • /
    • 2006
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.