End to End Encryption Architecture for Voice over Internet Protocol

@article{Lohiya2012EndTE,
  title={End to End Encryption Architecture for Voice over Internet Protocol},
  author={Kaustubh Lohiya and N. Shekokar and S. Devane},
  journal={International Journal of Computer Applications},
  year={2012},
  volume={41},
  pages={31-34}
}
Session Initiation Protocol (SIP) is an open standard protocol and constitutes the provisioning of services like Internet Telephony and Instant Messaging. Vulnerabilities in SIP have made it possible to exploit it and launch many of the known internet attacks and also few specific attacks, thus affecting the services deploying SIP for session management. To maintain the confidentiality and integrity of voice data security mechanisms need to be deployed. Currently available security measures do… Expand
3 Citations

References

SHOWING 1-10 OF 28 REFERENCES
Security Analysis of Voice-over-IP Protocols
Research on Security Mechanisms of SIP-Based VoIP System
VoIP Denial of service attacks classification and implementation
VPN Analysis and New Perspective for Securing Voice over VPN Networks
Practical Implementations for Securing VoIP Enabled Mobile Devices
Security Challenge and Defense in VoIP Infrastructures
  • D. Butcher, X. Li, Jinhua Guo
  • Computer Science
  • IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)
  • 2007
Security design and evaluation in a VoIP secure infrastracture: a policy based approach
Assessing the security of VoIP Services
An end-to-end approach to host mobility
...
1
2
3
...