2012
DOI: 10.5120/5610-7878
|View full text |Cite
|
Sign up to set email alerts
|

End to End Encryption Architecture for Voice over Internet Protocol

Abstract: Session Initiation Protocol (SIP) is an open standard protocol and constitutes the provisioning of services like Internet Telephony and Instant Messaging. Vulnerabilities in SIP have made it possible to exploit it and launch many of the known internet attacks and also few specific attacks, thus affecting the services deploying SIP for session management. To maintain the confidentiality and integrity of voice data security mechanisms need to be deployed. Currently available security measures do not take into ac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…A good study that uses the encryption to protect VoIP servers against brute force attack is presented in. [12]. Another study shows the detection system against SIPflooding attack that is caused by the brute force attack [13]- [14].…”
Section: Sip Trunk Threatmentioning
confidence: 99%
“…A good study that uses the encryption to protect VoIP servers against brute force attack is presented in. [12]. Another study shows the detection system against SIPflooding attack that is caused by the brute force attack [13]- [14].…”
Section: Sip Trunk Threatmentioning
confidence: 99%