Voice over Internet Protocol (VOIP) refers to the transmission of speech across data-style networks. This form of transmission is conceptually superior to conventional circuit switched communication in many ways. However, a plethora of security issues are associated with still-evolving VOIP technology. This publication introduces VOIP, its security challenges, and potential countermeasures for VOIP vulnerabilities.
Cited By
- Sushma A and Sanguankotchakorn T Implementation of IPsec VPN with SIP Softphones using GNS3 Proceedings of the 2018 VII International Conference on Network, Communication and Computing, (152-156)
- Saad A, Amran A, Phillips I and Salagean A Big data analysis on secure VoIP services Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, (1-8)
- Stoeckigt K, Vu H and Branch P Dynamic codec with priority for voice over IP in WLAN Proceedings of the second annual ACM conference on Multimedia systems, (199-210)
- Hagalisletto A, Strand L, Leister W and Groven A Analysing Protocol Implementations Proceedings of the 5th International Conference on Information Security Practice and Experience, (171-182)
- Keromytis A A Survey of Voice over IP Security Research Proceedings of the 5th International Conference on Information Systems Security, (1-17)
- Lee T, Jeong J, Kim H, Jeong H and Won Y User reputation based VoIP spam defense architecture Proceedings of the 23rd international conference on Information Networking, (161-165)
- Hunter M, Clark R and Park F Security issues with the IP multimedia subsystem (IMS) Proceedings of the 2007 Workshop on Middleware for next-generation converged networks and applications, (1-6)
- Wright C, Ballard L, Monrose F and Masson G Language identification of encrypted VoIP traffic Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, (1-12)
- Peng T, Leckie C and Ramamohanarao K (2007). Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Computing Surveys, 39:1, (3-es), Online publication date: 12-Apr-2007.
- Mazurczyk W and Kotulski Z New VoIP traffic security scheme with digital watermarking Proceedings of the 25th international conference on Computer Safety, Reliability, and Security, (170-181)
- Walsh T and Kuhn D (2005). Challenges in Securing Voice over IP, IEEE Security and Privacy, 3:3, (44-49), Online publication date: 1-May-2005.
Recommendations
Voice-over-IP Security: Research and Practice
Voice over IP (VoIP) technologies are increasingly used for personal and enterprise communications, thanks to their flexibility and cost efficiencies relative to the traditional phone network. The author presents a survey of all related vulnerabilities ...
A VoIP system for mobility voice security support using the VPN
Voice over internet protocol (VoIP) provided voice service using Internet. It receives footlights when it escapes an initial curiosity. Interest to VoIP increased, because it can transfer existing phone service and deliver voice data through Internet ...