2021 International Conference on Innovative Computing (ICIC) 2021
DOI: 10.1109/icic53490.2021.9692955
|View full text |Cite
|
Sign up to set email alerts
|

Voice Over Internet Protocol: Vulnerabilities and Assessments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…It requires only a minimal amount of communication mechanism to be carried out. It is commonly believed that UDP is an unstable transport protocol; however, it makes use of IP services, which provide a best effort delivery method [1]. In UDP, the receiver is not required to produce an acknowledgement of the packet that it has received, and the sender is not required to wait for any acknowledgement of the packet that it has delivered.…”
Section: User Datagram Protocol (Udp)mentioning
confidence: 99%
See 1 more Smart Citation
“…It requires only a minimal amount of communication mechanism to be carried out. It is commonly believed that UDP is an unstable transport protocol; however, it makes use of IP services, which provide a best effort delivery method [1]. In UDP, the receiver is not required to produce an acknowledgement of the packet that it has received, and the sender is not required to wait for any acknowledgement of the packet that it has delivered.…”
Section: User Datagram Protocol (Udp)mentioning
confidence: 99%
“…VoIP benefits service providers by opening up a new, lucrative revenue stream for them. VoIP offers consumers a glimpse into the future of communication by enabling low-cost, faster, more reliable, and secure connections for conversations across long distances or on tiny networks like local area networks or wide area networks [1]. In order to determine the effectiveness of packet switching communication network services, Quality of Service (QoS) criteria are deemed insufficient [2].…”
Section: Introductionmentioning
confidence: 99%
“…Everything is connected to the Internet, such as smart sensors, fitness mobile applications, thermostats, PV systems, air conditioners, and cooking appliances [10,11]. This rapid development in IoT technology is making it harder to secure and protect IoT data from attackers, hackers, unauthorized users, and malicious traffic [12][13][14]. Therefore, multiple defense mechanisms and strategies are being developed and implemented in IoT systems and frameworks to protect information.…”
Section: Iot Security and Datasetsmentioning
confidence: 99%