Detail publikace

Secure VoIP protocols, its comparison and performance analysis

Originální název

Secure VoIP protocols, its comparison and performance analysis

Anglický název

Secure VoIP protocols, its comparison and performance analysis

Jazyk

en

Originální abstrakt

Due to the importance of VOIP and the advantages that it offers, which the standard telephone systems are not able to offer, especially the cost issues, it's a very important need to facilitate the performance of VOIP system. Among many challenges that face VOIP such as Quality of service, susceptibility to power failure, etc. Security concerns seem to be the most important. VOIP has a different architecture than traditional networks ,and the assumption that since voice packets are being digitized then normal security mechanisms that are applied to data networks could be applied to VOIP is not ideal, this made it a challenge for designers to consider VOIP security issues. Some of the methods of attacking VOIP resources are denial-of-service (DOS), man-in-the-middle (spoofing), eavesdropping, etc. All of them attack the voice conversations, as well as other confidential data. This paper is not aimed to say which security mechanism is better than the other, because each mechanism has its own advantages and vulnerabilities, but we introduce a comparison between different protocols which are all deployed in VOIP system.

Anglický abstrakt

Due to the importance of VOIP and the advantages that it offers, which the standard telephone systems are not able to offer, especially the cost issues, it's a very important need to facilitate the performance of VOIP system. Among many challenges that face VOIP such as Quality of service, susceptibility to power failure, etc. Security concerns seem to be the most important. VOIP has a different architecture than traditional networks ,and the assumption that since voice packets are being digitized then normal security mechanisms that are applied to data networks could be applied to VOIP is not ideal, this made it a challenge for designers to consider VOIP security issues. Some of the methods of attacking VOIP resources are denial-of-service (DOS), man-in-the-middle (spoofing), eavesdropping, etc. All of them attack the voice conversations, as well as other confidential data. This paper is not aimed to say which security mechanism is better than the other, because each mechanism has its own advantages and vulnerabilities, but we introduce a comparison between different protocols which are all deployed in VOIP system.

Dokumenty

BibTex


@inproceedings{BUT92170,
  author="Ondřej {Krajsa} and Ivan {Míča} and Yara {Omran} and Petr {Sysel}",
  title="Secure VoIP protocols, its comparison and performance analysis",
  annote="Due to the importance of VOIP and the advantages that it offers, which the standard
telephone systems are not able to offer, especially the cost issues, it's a very
important need to facilitate the performance of VOIP system. Among many challenges
that face VOIP such as Quality of service, susceptibility to power failure,
etc. Security concerns seem to be the most important. VOIP has a different architecture
than traditional networks ,and the assumption that since voice packets are
being digitized then normal security mechanisms that are applied to data networks
could be applied to VOIP is not ideal, this made it a challenge for designers to consider
VOIP security issues. Some of the methods of attacking VOIP resources are
denial-of-service (DOS), man-in-the-middle (spoofing), eavesdropping, etc. All
of them attack the voice conversations, as well as other confidential data. This paper
is not aimed to say which security mechanism is better than the other, because
each mechanism has its own advantages and vulnerabilities, but we introduce a
comparison between different protocols which are all deployed in VOIP system.",
  address="ATSMA",
  booktitle="Proceedings of the 2012 International Conference on Telecommunication Systems",
  chapter="92170",
  edition="1",
  howpublished="electronic, physical medium",
  institution="ATSMA",
  year="2012",
  month="may",
  pages="150--153",
  publisher="ATSMA",
  type="conference paper"
}