SECURING VOIP COMMUNICATIONS IN AN OPEN NETWORK
|
|
|
- Basil Peters
- 10 years ago
- Views:
Transcription
1 SECURING VOIP COMMUNICATIONS IN AN OPEN NETWORK Mukund Sarma 1 1 Dept. of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Amrita School of Engineering, Amritanagar, Coimbatore, India, Abstract Channeling voice calls over IP networks has brought many advantages to enterprise communications, but it also creates some security risks. In this paper a technique to enhance the security of vocal and text communication is proposed. This technique is a combination of multipath routing and secret sharing scheme. Information is conveyed securely from one person to another over an open network using the secret sharing scheme. The original data is divided into two shares and each of these shares is sent over the open network through multiple different paths using the multipath routing technique. In case of a man-in-the-middle attack the person will not obtain any information of the original form with only one of the shares. Only if the person collects both the shares he/she can reconstruct the original information. A mechanism to secure SIP (Session Initiation Protocol) and text communication is also discussed in this paper. Keywords: VoIP, Secret sharing scheme, Multipath routing, Speech compression, RTP, TLS, SIP *** INTRODUCTION In the early days of VoIP, there was no big concern about security issues related to its use. People were mostly concerned with its cost, functionality and reliability. Now that VoIP is gaining wide acceptance and becoming one of the mainstream communication technologies, security has become a major issue..there are many security concerns in VoIP such as denial of service, alternation of voice stream, eavesdropping, redirection of call, data manipulation, caller ID imitation and man in the middle attacks.[1][2] To understand these concerns and know how handle them, the architecture of VoIP needs to be understood clearly. In the public switched telephone networks (PSTN) the entire communication paths were administered by officials. So the risk of man-in-themiddle attack is not as high as in the case of VoIP which has multiple intermediate exits between the two users. As a developer, to understand what the security risks in VoIP are, he/she needs to understand the architecture and working of VoIP. Figure 1 depicts the software architecture of VoIP. This architecture is similar to that of Linphone s software architecture. [15] Fig 1 Software architecture of VoIP Working of VoIP: The caller starts to speak once a call has been set up between two, or more, VoIP devices. At this point the voice signal is converted into a digital signal, formatted for transmission and sent along the network to the destination, where all of the preceding steps have to be reversed.[3] Figure 2 describes the architecture diagram of how VoIP works. Volume: 03 Special Issue: 07 May-2014, 6
2 Steps: 1. First the ADC converts analog voice to digital signals (bits) 2. Now the bits are compressed in a format which is best for transmission 3. The payload (voice packets) are inserted in data packets using a real-time protocol (typically RTP over UDP over IP) 4. A signaling protocol is needed to call users: SIP (Sessioninitiation protocol) does that. 5. At the other end packets are disassembled, data is extracted and then they converted to analog voice signals and sent to the phone. 6. Quality of Service (QoS) makes sure all this happens in the real time as one cannot wait for too long for a reply. plain text with no guarantee that the data that is received at the receivers end is indeed the data sent by the user. 2. SECURING VOICE CALLS IN THE PROPOSED METHOD Voice is first converted from analog to digital (bits) using an ADC (Analog to Digital Converter). The steps involved in digitizing voice include sampling, quantizing, silent suppression and compression. Since it is a vocal call, even if there is a small loss in data it won t affect the conversation. So a lossy compression minimizes the amount of data that needs to be transmitted. Codecs such as opus, SILK, speex, PCMU, isac etc. can be used for compression of data. [4][5] The SIP server chooses which type of codec is to be used for the call. The compressed data is cut into a constant size of 256 bits. This 256 bit alphanumeric string is then divided into two equal strings. These two 128 bit strings are converted into images. Visual cryptography is applied on these two images and these are now called shares. These shares are then sent on the open network using the concept of multipath routing. At the other end these shares are joined together and decrypted to get the message back in its original form. The use of visual sharing scheme eliminates the risk of eavesdropping. Another advantage of using the shares is that it does not require any key exchange. Since both the shares are sent on two random ports, even if there is a man-in-the-middle-attack he will not be able to modify the data. Figure 3 describes the working of the proposed method. [6] Fig 2 Working of VoIP While circuit switching keeps the connection open and constant, packet switching opens a brief connection long enough to send a packet, from one system to another. The sending device (computer/phone) opens a port/channel and sends the packet.. The risk of man-in-the-middle attack is high in the case of VoIP which has multiple intermediate exits between the two users. Man-in-the-middle attacks, eavesdropping and data manipulation can happen as voice traffic travels over the Internet. It is relatively easy for someone to eavesdrop on the media stream and obtain data. In order to prevent eavesdropping, a set of security protocols, called IPsec, is used to apply encryption to the digitized voice stream for VoIP. But this again involves key exchange and is vulnerable to man-inthe-middle attacks. Caller ID manipulation, redirection of a call, hijacking the session by registering happens when an attacker postures as a valid VoIP user and then hack into the system. Hijacking is possible because the signaling messages that the SIP sends as Fig 3 Working of the proposed method SH1 and SH2 are shares 1, 2 respectively. Volume: 03 Special Issue: 07 May-2014, 7
3 Working of Shamir s Visual Sharing Scheme: Visual secret sharing schemes (VSS) represents the particular case of secret sharing scheme where the shares are images. Naor and Shamir were the first to introduce them as a part of visual cryptography [7] [8] [9]. Each image (share) is considered to be a matrix of pixels. By convention, in blackand-white representation, a white pixel is represented by 0 and a black pixel is represented by 1. Example of Naor-Shamir VSS for two participants or two devices Corresponding shares in Shamir s VSS with 2 participants in the pixel notation are shown in Table 1. [10] Table 1 All possible shares in Shamir s VSS with 2 participants Fig 4 Shares of a 512 bit digitized string Multipath Routing: Multipath routing is a technique that allows data to be sent over multiple alternate paths. This is in contrast to a single routing protocol, where a data stream is directed along a single path from a sourceto a destination. With multiple paths, the source and destination pair can use any number of alternate routes to achieve performance enhancements, connection stability, and potential security improvements. Unlike singlepath algorithms, these multipath algorithms permit traffic multiplexing over multiple lines. Figure 4 shows how the digitized 512 bit number is converted to shares and how the two shares are overlapped to get back the original data. The data (share) is secure when communications are distributed across multiple paths. Here, instead of an intruder observing a common route, as in the case of single path routing, the data is spread out among alternate routes. This makes it difficult for an attacker to determine all the possible routes for a communication and thereby limit his/her interception of the data to a very small volume if one of the routes is being observed. Several methods have been studied in finding out disjoint paths. The concept of disjoint multipath routing is used to send packets for a particular session. [11] [12] Volume: 03 Special Issue: 07 May-2014, 8
4 3. SECURING TEXT COMMUNICATIONS IN THE PROPOSED METHOD VoIP applications make use of SIMPLE (Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions) an instant messaging and presence protocol suite based on Session Initiation Protocol (SIP). SIP is a signaling protocol, used for controlling multimedia communication sessions such as voice and video calls over the Internet. The protocol governs establishment, termination and other essential elements of a call. Messages sent are in the form of Plain text. Any intruder will be able to find out the user name, password and the data. The authentication (The users identity), Integrity (Is the message received the same as the one sent?), privacy and confidentiality (Is someone listening to the conversation?) are at stake. [13] One way to go about securing SIP is using TLS (Transport Layer Security) in SIP [14]. The other way is to encrypt the messages being sent and received to and from the SIP server. An application is developed at the server side that decrypts the encrypted messages that are being sent from the VoIP devices. If the SIP is not secured, there is a risk of attackers making unauthorized calls and gaining access to the VoIP network. This could lead to the access of private conversations made on the VoIP network thereby modifying the messages if needed or bringing down the entire VoIP network. [13] TLS provides an encrypted channel that can be used to send SIP messages. A public key cryptography algorithm is used to encrypt the messages. 4. SUMMARY The proposed method aims to reduce the security risks involved in VoIP communication. Security risks involving voice communication is reduced using the concept of visual cryptography and multipath routing technique. The Shamir s visual sharing scheme has been implemented to achieve the secret sharing scheme. The shares generated are then sent over the network using the concept of disjoint multipath routing. The paper also proposes two methods on how to secure text communications in VoIP. The proposed method ensures the security concerns in VoIP such as denial of service, alternation of voice stream, eavesdropping, redirection of call, data manipulation, caller ID imitation and man in the middle attacks are not compromised. ACKNOWLEDGMENTS I am highly indebted to Amrita Vishwa Vidyapeetham for their kind co-operation and encouragement which help me in doing this project. I also wish to express sincere gratitude to ADRIN, Department of Space, Government of India for providing me necessary guidance and support required to work on this project. REFERENCES [1]. Hung P.C.K., Martin M.V Security Issues in VOIP Applications Electrical and Computer Engineering Conference (CCECE).ISBN: pp: DOI: /CCECE [2]. D. Butcher, X. Li, and J. Guo, Security Challenge and Defense in VoIP Infrastructures, IEEE Trans.Systems, Man, and Cybernetics Part C: Applications and Reviews, vol. 37, no. 6, pp [3]. Khaled Salah, On the Deployment of VoIP in Ethernet Networks: Methodology and Case Study, Department of Information and Computer Science, King Fahd University of Petroleum and Minerals. m.pdf [4]. Malik Ahsan Ali, Imran Rashid, Adnan Ahmed Khan, Selection of VoIP CODECs for Different Networks based on QoS Analysis. International Journal of Computer Applications (IJCA), Vol 84 Issue 5, DOI: / [5]. Leigh A. Thorpe, Subjective evaluation of speech compression codecs and other non-linear voice-path devices for telephony applications, International Journal of Speech Technology. vol. 2, pp: DOI: /BF [6]. Ryouichi Nishimura, Shun-ichiro Abe, Norihiro Fujita and Yoiti Suzuki, Nobuyuki Enomoto, Tsutomu Kitamura and Atsushi Iwata, 2010 Reinforcement of VoIP Security with Multipath Routing and Secret Sharing Scheme Journal of Information Hiding and Multimedia Signal Processing. ISSN Ubiquitous International Volume 1, Number 3, pp: [7]. Moni Naor, Adi Shamir, Visual Cryptography, Advanced in Cryptology EUROCRYPT 94, LNCS950. Springer-Verlag. pp: [8]. C. Blundo, S. Cimato, and A. De Santis, Visual Cryptography Schemes with Optimal Pixel Expansion, Theoretical Computer Science, vol 369, pp: [9]. C. Blundo, A. De Santis, D.R. Stinson, On the contrast in visual cryptography schemes, J. Cryptology, vol 12, pp: [10]. Ruxandra Olimid, Python Implementation of Visual Secret Sharing Schemes, Journal of Information Systems & Operations Management, Vol [11]. S.-J. Lee and M. Gerla, Split Multipath Routing with Maximally Disjoint Paths in Ad hoc Networks, Proc. of Int. Conf. on Communications, vol. 10, pp: [12]. W. Lou and Y. Fang, A Multipath Routing Approach for Secure Data Delivery, Proc. of Military Communications Conference (MILCOM), vol. 2, pp: Volume: 03 Special Issue: 07 May-2014, 9
5 [13]. Salsano S, Veltri L, Papalilo D, SIP security issues: the SIP authentication procedure and its processing load Network, IEEE, Vol 16, issue 6, pp: 38-44, DOI: /MNET [14]. Tadashi Kaji, Kazuyoshi Hoshino, Takahiro Fujishiro, Osamu Takata, Akifumi Yato, Keisuke Takeuchi, Satoru Tezuka, TLS handshake method based on SIP, Proceedings of the International Multiconference on Computer Science and Information Technology, pp: [15]. Software Architecture (2014) Available at: (Accessed: 8 Febuary 2014) Volume: 03 Special Issue: 07 May-2014, 10
TLS handshake method based on SIP
Proceedings of the International Multiconference on ISSN 1896-7094 Computer Science and Information Technology, pp. 467 475 2006 PIPS TLS handshake method based on SIP Tadashi Kaji 1, Kazuyoshi Hoshino
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
Secured Secret Sharing over Single Path in VoIP with Consistent Data Transfer
International Journal of Computer Science and Telecommunications [Volume 3, Issue 1, January 2012] 23 ISSN 2047-3338 Secured Secret Sharing over Single Path in VoIP with Consistent Data Transfer K. Maheswari
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Secure VoIP Transmission through VPN Utilization
Secure VoIP Transmission through VPN Utilization Prashant Khobragade Department of Computer Science & Engineering RGCER Nagpur, India [email protected] Disha Gupta Department of Computer Science
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
Functional Specifications Document
Functional Specifications Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:19-10-2007
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Applications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Securing Voice over Internet Protocol
Proceedings of the International Multiconference on ISSN 1896-7094 Computer Science and Information Technology, pp. 21 29 2007 PIPS Securing Voice over Internet Protocol Ahmad Ghafarian, Randolph Draughorne,
VoIP telephony over internet
VoIP telephony over internet Yatindra Nath Singh, Professor, Electrical Engineering Department, Indian Institute of Technology Kanpur, Uttar Pradesh India. http://home.iitk.ac.in/~ynsingh MOOC on M4D (c)
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
SIP, Session Initiation Protocol used in VoIP
SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1
A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK
A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK S.Veni 1 and Dr.G.M.Kadhar Nawaz 2 1 Research Scholar, Barathiar University, Coimbatore, India [email protected] 2 Director, Dept. of MCA, Sona College
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080
Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP
Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,
Introduction to VoIP Technology
Lesson 1 Abstract Introduction to VoIP Technology 2012. 01. 06. This first lesson of contains the basic knowledge about the terms and processes concerning the Voice over IP technology. The main goal of
Indepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
Course 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic
TraceSim 3.0: Advanced Measurement Functionality for Secure VoIP Networks and Simulation of Video over IP No part of this brochure may be copied or published by means of printing, photocopying, microfilm
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Implementing VoIP support in a VSAT network based on SoftSwitch integration
Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Overview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
A Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Threats to be considered (1) ERSTE GROUP
VoIP-Implementation Lessons Learned Philipp Schaumann Erste Group Bank AG Group IT-Security [email protected] http://sicherheitskultur.at/ Seite 1 Threats to be considered (1) Eavesdropping
Secured Communications using Linphone & Flexisip
Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts
Simulation of SIP-Based VoIP for Mosul University Communication Network
Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication
An Application of Visual Cryptography To Financial Documents
An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University
Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology
Unregister Attack in SIP Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology Unregister Attack We present a new VoIP Denial Of
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
SIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and
1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Basic principles of Voice over IP
Basic principles of Voice over IP Dr. Peter Počta {[email protected]} Department of Telecommunications and Multimedia Faculty of Electrical Engineering University of Žilina, Slovakia Outline VoIP Transmission
An Overview on Security Analysis of Session Initiation Protocol in VoIP network
An Overview on Security Analysis of Session Initiation Protocol in VoIP network Tarendra G. Rahangdale 1, Pritish A. Tijare 2, Swapnil N.Sawalkar 3 M.E (Pursuing) 1, Associate Professor 2, Assistant Professor
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Overview Steganography is the process of hiding secret data inside other, normally transmitted data. In other words, as defined by [40] steganography means hiding of a secret
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
A MELIORATED APPROACH TO TEXT STEGANOGRAPHY USING MARKUP LANGUAGES AND AES
A MELIORATED APPROACH TO TEXT STEGANOGRAPHY USING MARKUP LANGUAGES AND AES K.Ramesh 1, P.Manivannan 2 1,2 Assistant Professor, Department of Information Technology, V.R.S. College of Engineering & Technology,
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
VOIP TELEPHONY: CURRENT SECURITY ISSUES
VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
Security and the Mitel Teleworker Solution
Security and the Mitel Teleworker Solution White Paper July 2007 Copyright Copyright 2007 Mitel Networks Corporation. This document is unpublished and the following notice is affixed to protect Mitel Networks
Security & Encryption
Security & Encryption Introduction: the importance of encryption nected networks, spies can tap into the connection from Encryption for security is thousands of years old. With the No longer can any business
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and
Global Network. Whitepaper. September 2014. Page 1 of 9
Global Network Whitepaper September 2014 Page 1 of 9 Contents 1. Overview...2 2. Global Connectivity, Quality of Service and Reliability...2 2.1 Exceptional Quality...3 2.2 Resilience and Reliability...3
Java Based VoIP Performance Monitoring Tool
, October 20-22, 2010, San Francisco, USA Java Based VoIP Performance Monitoring Tool Husna Zainol Abidin, Mohd Ameer Yuslan Razmi, Farah Yasmin Abdul Rahman, Ihsan Mohd Yassin Abstract This paper describes
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
IP Telephony - Future investment or risk assessment?
Master Thesis Computer Science Thesis no: MSC-2004-11 June 2004 IP Telephony - Future investment or risk assessment? Authors: Josephine Larsson Ida Waller School of Engineering Blekinge Institute of Technology
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Padma Charan Das Dept. of E.T.C. Berhampur, Odisha, India
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Measuring Quality
Ingate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
REVIEW OF WEB-BROWSER COMMUNICATIONS SECURITY
REVIEW OF WEB-BROWSER COMMUNICATIONS SECURITY ANTON PAVLOVICH TEYKHRIB Company Naumen (Nau-Service) E-mail: [email protected] ABSTRACT The issues of Internet communications security are considered in
Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
VOIP Security Essentials. Jeff Waldron
VOIP Security Essentials Jeff Waldron Traditional PSTN PSTN (Public Switched Telephone Network) has been maintained as a closed network, where access is limited to carriers and service providers. Entry
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT
Review of the Air Force Academy No 1 (31) 2016 METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Paul MOZA, Marian ALEXANDRU Transilvania University, Brașov, Romania DOI: 10.19062/1842-9238.2016.14.1.16
CE 817 - Advanced Network Security VoIP Security
CE 817 - Advanced Network Security VoIP Security Lecture 25 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially
Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.
Optimizing Converged Cisco Networks (ONT) reserved. Lesson 2.4: Calculating Bandwidth Requirements for VoIP reserved. Objectives Describe factors influencing encapsulation overhead and bandwidth requirements
VoIP Security Threats and Vulnerabilities
Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: [email protected] This paper presents the
