1st IEEE Workshop on VoIP Management and Security, 2006. 2006
DOI: 10.1109/voipms.2006.1638116
|View full text |Cite
|
Sign up to set email alerts
|

Securing VoIP and PSTN from integrated signaling network vulnerabilities

Abstract: The liberalization of public switched telephone network (PSTN) and growing acceptance of SIGTRAN protocol suite have introduced new and yet to be trusted signaling entities. Thus security threats emerging from one network not only affects itself but other network also. We show how this integrated signaling environment can become a security threat to emerging VoIP and PSTN networks. We propose a security solution as a fix. Our proposal goes beyond "Gateway Screening" and "SS7 Gatekeeper" proposed by Telcordia a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…Sengar et al [7] illustrated about the threats pertaining to security in the integrated signaling environment and also the evolving PSTN and VoIP networks. The important challenge of this work is that the networks in the neighborhood are vulnerable to attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Sengar et al [7] illustrated about the threats pertaining to security in the integrated signaling environment and also the evolving PSTN and VoIP networks. The important challenge of this work is that the networks in the neighborhood are vulnerable to attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Sengar et al [253], [254], [255] examine the problem of cross-infrastructure vulnerabilities created by bridging VoIP and PSTN networks. They outline a high-level architecture that integrates firewall-like functionality with trust management, signaling encryption and authentication, and intrusion detection.…”
Section: ) Authentication Protocols (15 Items)mentioning
confidence: 99%
“…Another studied cross infrastructure vulnerabilities that bridged VoIP and PSTN networks [24]. A general outline with a high-level of architecture was potentially found for firewalls, including functionality and signaling trust management, encryption, authentication, and intrusion detection.…”
Section: Trunks Through Sip Server Firewallmentioning
confidence: 99%