Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1298216.1298238acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Critical vpn security analysis and new approach for securing voip communications over vpn networks

Published: 22 October 2007 Publication History

Abstract

Security presents a big challenge for transmitting voice traffic over the Internet. The goal is to acquire the same security level offered.

References

[1]
A. Passito. Evaluating Voice Speech Quality in 802.11b Networks with VPN/IPSec. Proceedings of the XIII IEEE International Conference on Networks, 2005.
[2]
A. Steffen, D. Kaufmann, and A. Stricker. SIP Security. Security Group Zürcher Hochschule Winterthur, 2004.
[3]
B. Hartpence. Curricular Response to the Real Time Data And VoIP Tidal Wave. The Consortium for Computing Sciences in Colleges, 2007.
[4]
B. Springer and L. Kilmartin. Performance evaluation of the Internet Key Exchange Protocol under dynamic VoIP network conditions. ISSC, Jul 2003.
[5]
D.R.Kuhn, T.J.Walsh, and S.Fries, Security Considerations for Voice over IP Systems. NIST Gaithersburg, Jan 2005.
[6]
Federal Information. Advanced Encryption Standard (AES). Processing Standards Publication 197, Nov 2001.
[7]
J. Orrblad, "Alternatives to MIKEY/SRTP to secure VoIP", Master Thesis, KTH, Stockholm, March 2005.
[8]
M. Saarinen. Legacy User Authentication with IPSEC. Helsinki, Finland, Feb 2004.
[9]
N. Lindqvist. SIP Session Initiation Protocol. Seminar on Instant Messaging and Presence Architectures in the Internet, 2005.
[10]
Nascimento, A. Passito, E. Mota, and L Carvalho. Can I add a Secure VoIP call? Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2006.
[11]
Passito. Performance evaluation of VoIP traffic using IPSecurity protocol. Proceedings of I Workshop on Computer Science and Information Systems, Brazil 2004.
[12]
R. Barbieri, D. Bruschi, and E. Rosti. Voice over IPSec: Analysis and Solutions. 18th Annual Computer Security Applications Conference San Diego California, Dec 2002.
[13]
S. Huang, Z. Liu, and J. Chen. SIP-Based Mobile VPN for Real-Time Applications. Hsinchu, Taiwan 2005.

Cited By

View all
  • (2022)A deep learning‐based framework to identify and characterise heterogeneous secure network trafficIET Information Security10.1049/ise2.1209517:2(294-308)Online publication date: 3-Oct-2022
  • (2021)VoIP Codec Performance Evaluation on GRE with IPsec over IPv4 and IPv6Advances in Science, Technology and Engineering Systems Journal10.25046/aj0605286:5(260-266)Online publication date: Oct-2021
  • (2010)Digital certificate management for document workflows in E-government servicesProceedings of the 9th IFIP WG 8.5 international conference on Electronic government10.5555/1887132.1887169(363-374)Online publication date: 29-Aug-2010
  • Show More Cited By

Index Terms

  1. Critical vpn security analysis and new approach for securing voip communications over vpn networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WMuNeP '07: Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modeling
      October 2007
      104 pages
      ISBN:9781595938046
      DOI:10.1145/1298216
      • Program Chairs:
      • Regina B. Araujo,
      • Christos Bouras
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 October 2007

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. IPSec
      2. SIP
      3. VPN
      4. VoIP
      5. security
      6. voice over VPN

      Qualifiers

      • Article

      Conference

      MSWiM07
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 36 of 90 submissions, 40%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)19
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 04 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)A deep learning‐based framework to identify and characterise heterogeneous secure network trafficIET Information Security10.1049/ise2.1209517:2(294-308)Online publication date: 3-Oct-2022
      • (2021)VoIP Codec Performance Evaluation on GRE with IPsec over IPv4 and IPv6Advances in Science, Technology and Engineering Systems Journal10.25046/aj0605286:5(260-266)Online publication date: Oct-2021
      • (2010)Digital certificate management for document workflows in E-government servicesProceedings of the 9th IFIP WG 8.5 international conference on Electronic government10.5555/1887132.1887169(363-374)Online publication date: 29-Aug-2010
      • (2010)Digital Certificate Management for Document Workflows in E-Government ServicesElectronic Government10.1007/978-3-642-14799-9_31(363-374)Online publication date: 2010
      • (2008)VPN solution for securing voice over third generation networks2008 2nd International Conference on Internet Multimedia Services Architecture and Applications10.1109/IMSAA.2008.4753921(1-6)Online publication date: Dec-2008

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media