skip to main content
SP 800-58. Security Considerations for Voice Over IP SystemsJanuary 2005
2005 Technical Report
Publisher:
  • National Institute of Standards & Technology
  • Gaithersburg
  • MD
  • United States
Published:01 January 2005
Bibliometrics
Skip Abstract Section
Abstract

Voice over Internet Protocol (VOIP) refers to the transmission of speech across data-style networks. This form of transmission is conceptually superior to conventional circuit switched communication in many ways. However, a plethora of security issues are associated with still-evolving VOIP technology. This publication introduces VOIP, its security challenges, and potential countermeasures for VOIP vulnerabilities.

Cited By

  1. ACM
    Sushma A and Sanguankotchakorn T Implementation of IPsec VPN with SIP Softphones using GNS3 Proceedings of the 2018 VII International Conference on Network, Communication and Computing, (152-156)
  2. ACM
    Saad A, Amran A, Phillips I and Salagean A Big data analysis on secure VoIP services Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, (1-8)
  3. ACM
    Stoeckigt K, Vu H and Branch P Dynamic codec with priority for voice over IP in WLAN Proceedings of the second annual ACM conference on Multimedia systems, (199-210)
  4. Hagalisletto A, Strand L, Leister W and Groven A Analysing Protocol Implementations Proceedings of the 5th International Conference on Information Security Practice and Experience, (171-182)
  5. Keromytis A A Survey of Voice over IP Security Research Proceedings of the 5th International Conference on Information Systems Security, (1-17)
  6. Lee T, Jeong J, Kim H, Jeong H and Won Y User reputation based VoIP spam defense architecture Proceedings of the 23rd international conference on Information Networking, (161-165)
  7. ACM
    Hunter M, Clark R and Park F Security issues with the IP multimedia subsystem (IMS) Proceedings of the 2007 Workshop on Middleware for next-generation converged networks and applications, (1-6)
  8. Wright C, Ballard L, Monrose F and Masson G Language identification of encrypted VoIP traffic Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, (1-12)
  9. ACM
    Peng T, Leckie C and Ramamohanarao K (2007). Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Computing Surveys, 39:1, (3-es), Online publication date: 12-Apr-2007.
  10. Mazurczyk W and Kotulski Z New VoIP traffic security scheme with digital watermarking Proceedings of the 25th international conference on Computer Safety, Reliability, and Security, (170-181)
  11. Walsh T and Kuhn D (2005). Challenges in Securing Voice over IP, IEEE Security and Privacy, 3:3, (44-49), Online publication date: 1-May-2005.
Contributors
  • University of Birmingham
  • National Institute of Standards and Technology
  • Siemens AG

Recommendations