Publication detail

Secure VoIP protocols, its comparison and performance analysis

KRAJSA, O. MÍČA, I. OMRAN, Y. SYSEL, P.

Original Title

Secure VoIP protocols, its comparison and performance analysis

English Title

Secure VoIP protocols, its comparison and performance analysis

Type

conference paper

Language

en

Original Abstract

Due to the importance of VOIP and the advantages that it offers, which the standard telephone systems are not able to offer, especially the cost issues, it's a very important need to facilitate the performance of VOIP system. Among many challenges that face VOIP such as Quality of service, susceptibility to power failure, etc. Security concerns seem to be the most important. VOIP has a different architecture than traditional networks ,and the assumption that since voice packets are being digitized then normal security mechanisms that are applied to data networks could be applied to VOIP is not ideal, this made it a challenge for designers to consider VOIP security issues. Some of the methods of attacking VOIP resources are denial-of-service (DOS), man-in-the-middle (spoofing), eavesdropping, etc. All of them attack the voice conversations, as well as other confidential data. This paper is not aimed to say which security mechanism is better than the other, because each mechanism has its own advantages and vulnerabilities, but we introduce a comparison between different protocols which are all deployed in VOIP system.

English abstract

Due to the importance of VOIP and the advantages that it offers, which the standard telephone systems are not able to offer, especially the cost issues, it's a very important need to facilitate the performance of VOIP system. Among many challenges that face VOIP such as Quality of service, susceptibility to power failure, etc. Security concerns seem to be the most important. VOIP has a different architecture than traditional networks ,and the assumption that since voice packets are being digitized then normal security mechanisms that are applied to data networks could be applied to VOIP is not ideal, this made it a challenge for designers to consider VOIP security issues. Some of the methods of attacking VOIP resources are denial-of-service (DOS), man-in-the-middle (spoofing), eavesdropping, etc. All of them attack the voice conversations, as well as other confidential data. This paper is not aimed to say which security mechanism is better than the other, because each mechanism has its own advantages and vulnerabilities, but we introduce a comparison between different protocols which are all deployed in VOIP system.

Keywords

secure, SIP, IAX, SRTP, ZRTP

RIV year

2012

Released

24.05.2012

Publisher

ATSMA

Location

Praha

ISBN

978-0-9820958-6-7

Book

Proceedings of the 2012 International Conference on Telecommunication Systems

Edition

1

Edition number

1

Pages from

150

Pages to

153

Pages count

4

Documents

BibTex


@inproceedings{BUT92170,
  author="Ondřej {Krajsa} and Ivan {Míča} and Yara {Omran} and Petr {Sysel}",
  title="Secure VoIP protocols, its comparison and performance analysis",
  annote="Due to the importance of VOIP and the advantages that it offers, which the standard
telephone systems are not able to offer, especially the cost issues, it's a very
important need to facilitate the performance of VOIP system. Among many challenges
that face VOIP such as Quality of service, susceptibility to power failure,
etc. Security concerns seem to be the most important. VOIP has a different architecture
than traditional networks ,and the assumption that since voice packets are
being digitized then normal security mechanisms that are applied to data networks
could be applied to VOIP is not ideal, this made it a challenge for designers to consider
VOIP security issues. Some of the methods of attacking VOIP resources are
denial-of-service (DOS), man-in-the-middle (spoofing), eavesdropping, etc. All
of them attack the voice conversations, as well as other confidential data. This paper
is not aimed to say which security mechanism is better than the other, because
each mechanism has its own advantages and vulnerabilities, but we introduce a
comparison between different protocols which are all deployed in VOIP system.",
  address="ATSMA",
  booktitle="Proceedings of the 2012 International Conference on Telecommunication Systems",
  chapter="92170",
  edition="1",
  howpublished="electronic, physical medium",
  institution="ATSMA",
  year="2012",
  month="may",
  pages="150--153",
  publisher="ATSMA",
  type="conference paper"
}