SIP Security Mechanism Techniques on Voice over Internet Protocol (VoIP) System Research Papers (original) (raw)
This paper deals with the secure transformation of text. Encryption is the most common method of hiding text from unauthorized access. Two popular ways of sending personal information in a secret way are Cryptography and Steganography. To... more
This paper deals with the secure transformation of text. Encryption is the most common method of hiding text from unauthorized access. Two popular ways of sending personal information in a secret way are Cryptography and Steganography. To hide the existence of the message as well as distorts the message itself using this method. LSB and ELSB are the advanced techniques used to hide text in the image. There are two levels to hide the secret information. In the first level of hiding text, data sent to images by using the password and in second level encryption of 2D Cellular Automata used to enhance more security. If one level of security technique is broken by third person then there will be one more level to provide security to that secret information. Encryption will do using 2 dimensional rules of Cellular Automata. The use of Cellular Automata rules is for the parallelism which provides high security during storing and communicating, higher compression ratio and higher encoding of data while comparing with the available security techniques.
An ATM is a self service technology in financial service delivery usually adopted by financial institutions to reach their customers outside the banking hall. The study simulates the operations of an Automated Teller Machine (ATM).... more
An ATM is a self service technology in financial service delivery usually adopted by financial institutions to reach their
customers outside the banking hall. The study simulates the operations of an Automated Teller Machine (ATM).
Minimal assumptions were made about the working of the ATM, the study used a personal computer (PC) for the
simulation and information in the database are records of bank customers. The methodology used is object oriented
analysis and design methodology (OOADM) and the analysis tool used is UML. All basic operations of the ATM
hardware devices were encapsulated by the software including deposit operation that is not currently functional in our
present ATM operation. This software can be integrated with the ATM hardware at a later time. The study showed that
ATM can effectively, efficiently and reliably handle almost all forms of financial service delivery to bank customers.
—IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to support secure TCP/IP environment over the Internet considering flexibility, scalability, and interoperability. IPSEC primarily supports security... more
—IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to support secure TCP/IP environment over the Internet considering flexibility, scalability, and interoperability. IPSEC primarily supports security among hosts rather than users unlike the other security protocols. Recently, IPSEC is emphasized as one of the important security infrastructures in the NGI (Next Generation Internet). It also has suitable features to implement VPN (Virtual Private Network) efficiently and its application areas are expected to grow rapidly. In this paper, the basic concepts and related standard documents of IPSEC will be introduced.
Over IP network the SIP-based VoIP system build , so it is precious by the IP network security problem. In this paper we concentrate on the issue of denial of service (DoS) attacks which targeting the hardware and software of voice over... more
Over IP network the SIP-based VoIP system build , so it is precious by the IP network security problem. In this paper we concentrate on the issue of denial of service (DoS) attacks which targeting the hardware and software of voice over IP servers .In this situation we mainly identify attacks based on exhaustion the memory of VoIP servers, attacks on the CPU. A major conclusion is that SIP provides a wide range of features that can be used to accumulate DoS attacks. Discovering these attacks is inherently difficult, in the case of DoS attacks on other IP components.
Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e. the cloud service provider and the client. The architecture shifts data, applications and development environments to large data... more
Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e.
the cloud service provider and the client. The architecture shifts data, applications and development
environments to large data centers thereby providing storage, software and platform services online. The
notion on verifying data for intactness is termed as data auditing and the process is carried out by the
client or by a third party auditor delegated by the client. The delegation model lessen client’s overhead but
may not be fully trustworthy since the third party has direct access to client’s private data. The third party
auditing brings in many new security challenges, and one among those is untrusted TPA. In the process of
avoiding such an access this work designs a well secured, novel verification scheme that allows the
vulnerable third party to perform verification as well as ensures data privacy in cloud.
ASTPP is an Open Source VoIP billing solution for Freeswitch. It supports pre-paid and post-paid billing with call rating, credit control and call reporting. It also provides many other features such as calling cards, least cost routing... more
ASTPP is an Open Source VoIP billing solution for Freeswitch. It supports pre-paid and post-paid billing with call rating, credit control and call reporting. It also provides many other features such as calling cards, least cost routing (LCR), did management, reseller management etc.
Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership... more
Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls. The security of SIP is becoming more and more important. Authentication is the most important security service required by SIP. To ensure a secured communication, many SIP authentication protocols have been proposed. This work provides an overview of the proposed schemes based on elliptic curve cryptography. Those proposed schemes are analyzed in security consideration and the computational cost. 1. Introduction Telephony over IP (ToIP) is a service that allows you to transfer voice communications flow on IP (Internet Protocol). This is the application that will require the IP infrastructure as the standard for all types of information or media. The Session Initiation Protocol (SIP) is a signaling protocol used to manage, establish and terminate the communication sessions between two or more participants. SIP is not limited to telephone calls, but it can be used for multimedia conferencing [1], instant messaging and online games,... View this popularity and use in public networks, SIP security becomes more and more important. Authentication is the most security service required for SIP. The original SIP authentication protocol is HTTP Digest Authentication [2]. However, this protocol was found vulnerable to deferent attacks. In order to reinforce SIP authentication, a large community has been participated by proposing different protocols based on various mechanisms. In this paper we have analysed the proposed protocols based on security offred and total ranning time; the comparison between those protocols can helped as to determinate based on elliptic curve cryptography. The remainder of this paper is organized as follows. Section 2 delivers general information on the architecture and the original SIP authentication protocol. In section 3, we analyze the performance security of proposed protocols. A comparison between the proposed protocols in terms of security and computational cost consideration are presented in section 4. Finally, section 5 concludes this research.
This paper describes the implementation process of the Free Technologies Open Laboratory (LATL) in the Center for Information Technology Renato Archer (CTI) under the approach of 5W1H framework. The actions of adoption, use and... more
This paper describes the implementation process of the Free Technologies Open Laboratory (LATL) in the Center for Information Technology Renato Archer (CTI) under the approach of 5W1H framework. The actions of adoption, use and development of ICT by governs remain controversial between daily practice and legislation pro free technologies. The implementation of LATL aims to provide means to promote and empower government units in the use and development of free technologies and open standards for documents and data. The application of 5W1H model proved useful in the definition and evaluation of the actions of cause and effect in the implementation process of the laboratory. Resumo. Este artigo descreve o processo de implantação do Laboratório Aberto de Tecnologias Livres (LATL) no Centro de Tecnologia da Informação Renato Archer (CTI) sob o enfoque do modelo 5W1H. As ações de adoção, uso e desenvolvimento de TIC por governos continuam sendo controversas entre a prática vigente e a legislação pró tecnologias livres. A implantação do LATL visa proporcionar meios para promover e capacitar unidades de governo no uso e desenvolvimento de tecnologias livres e padrões abertos para documentos e dados. A aplicação do modelo 5W1H mostrou-se útil na definição e avaliação das ações de causa e efeito do processo de implantação do laboratório.
VoIP is technology for transmitting voice and data over IP for communication. It has various benefits such as, voice messaging, calling, video messaging as well as video conferencing with file sharing. VoIP is better than Public Switched... more
VoIP is technology for transmitting voice
and data over IP for communication. It has various
benefits such as, voice messaging, calling, video messaging
as well as video conferencing with file sharing. VoIP is
better than Public Switched Telephone Network (PSTN)
and cellular network. We can see all the services in VoIP
based application such as Skype, Google talk. Due to the
file sharing and information transformation in VoIP, there
are more chances to loss valuable data information. For
that the security provisions must be there. To prevent
from such problem there are various techniques designed.
In this research paper we study that various techniques
proposed for security in VoIP environment.
In this paper, we present an optimized implementation of secure VoIP protocol stack so that the stack would fit into the memory and computation budget of constrained embedded systems. The novel approach that we take to achieve this is to... more
In this paper, we present an optimized implementation of secure VoIP protocol stack so that the stack
would fit into the memory and computation budget of constrained embedded systems. The novel approach
that we take to achieve this is to perform cross-layer optimization of buffers and buffer operations.
Buffers and buffer operations are involved in playback, capture, codec transformations, and network I/O.
Following this approach, we have implemented VoIP application functions, RTP, and Secure RTP
protocols in a tightly integrated and highly optimized manner, on the top of the embedded TCP/IP stack,
uIP. We call the protocol stack thus constructed, the uVoIP stack. We have tested the uVoIP stack in
GNU/Linux Operating System using tunnel device for sending and receiving raw packets.