Analysis of Voice over Internet Protocol - Security Issues and Solutions – Term Paper Example

Download full paperFile format: .doc, available for editing

The paper “ Analysis of Voice over Internet Protocol   - Security Issues and Solutions” is a   spectacular variant of term paper on information technology. In the past few years, there have emerged a large number of technologies that have quickly gained popularity among people. In this scenario, VoIP (voice of internet protocol) is one of the most attractive technologies that have quickly become a need for people. Though VoIP brings a number of benefits for its users at the same time it brings various security concerns that discourage the use of this technology.

The basic purpose of this paper is to analyze some of the important security concerns and propose solutions. This paper first discusses the concept of VoIP, and some of the important aspects associated with VoIP such as its working, benefits, and uses. After that, this paper discusses security and privacy concerns associated with VoIP along with suggestions to deal with them. Keywords-VoIP; IP; QoS; DoS; P2P, firewallsVoice over Internet Protocol (VoIP) is a well-known buzzword nowadays. It is a new technology-based communication or way of talking over the phone just round the corner.

Basically, the VoIP is a modern technology that does not require using a traditional phone line for the distribution of voice signals in its place it uses a broadband Internet connection. Before we go into the detail of security issues and challenges faced by people while using or through this technology it is necessary to understand the basics of VoIP networks. It is an admitted fact that Internet communication is carried out in the form of digital signals while voice appears in the form of analog signals.

Basically, in order to convert these analog signals into digital signals, a variety of services are used that transform one’ s voice into a digital signal in order that it could move all over the Internet. In the same way, when the Internet connection is used to make a call to a traditional phone system then this digital signal is again converted to an analog signal in order to support the communication process. In addition, using VoIP the users can make calls to different destinations, for instance, they can make a call directly from a computer to a computer, or a traditional phone linked with a special adapter or a special VoIP phone.

Moreover, at the present, almost every popular location like that parks, airports, and cafes contain hot spots that let one connect to the Internet and allow them to make use of VoIP service without having special equipment [3]. The main advantage of this technology is that it minimizes the costs that come with a customary phone line, as a minimum at this point in the game. Additionally, this is a new communication technology framework that offers the savings of hundreds, or yet thousands of dollars for a number of people.

In addition, someone who has utilized voice chat software would be aware of the latency concerns that propagate through some kind of data transfer comprising the internet. However, VoIP technology addresses the latency concerns through RTP or real-time communication protocol. This communication protocol guarantees that data packets are sent and received in a timely way [7]. However, at the same time, it raises various concerns and some of them are related to the security and privacy of this data.

This paper presents a detailed analysis of concerns and issues that occur while using VoIP systems. The basic purpose of this research is to analyze the security weaknesses of VoIP and propose some mechanisms to overcome these weaknesses. This paper starts with a detailed introduction of VoIP, its benefits, and uses. After that, a detailed discussion on security issues and solutions is provided.

References

XI. REFERENCES

1. Baker, A., 2006. Intel VoIP over WLAN architecture. New York, USA, ACM.

2. Bijl, P. W. J. d. & Peitz, M., 2010. Regulatory legacy, VoIP adoption, and investment incentives. Telecommunications Policy, 34(10), pp. 596-605.

3. Blake, E. A., 2007. Network security: VoIP security on data network--a guide. Kennesaw, Georgia, USA, ACM.

4. Chavhan, N. A. & Chhabria, S. A., 2009. Multiple design patterns for voice over IP security. New York, USA, ACM.

5. Chou, W., 2007. Strategies to Keep Your VoIP Network Secure. IT Professional, 9(5), pp. 42-46.

6. Fessi, A., Niedermayer, H., Kinkelin, H. & Carle, G., 2007. A Cooperative SIP Infrastructure for Highly Reliable Telecommunication Services. New York, USA, ACM.

7. Karapantazis, S. & Pavlidou, F.-N., 2009. VoIP: A comprehensive survey on promising technology. Computer Networks: The International Journal of Computer and Telecommunications Networking, 53(12), pp. 2050-2090.

8. Koskela, J., Karvonen, K., Kilinkaridis, T. & Gurtov, A., 2010. Secure and usable P2P VoIP for mobile devices. New York, USA, ACM.

9. Li, Y.-M. & Chiu, S.-W., 2011. VoIP pricing in competitive telephony markets. New York, USA, ACM.

10. Nascimento, A., Passito, A. & Mota, E., 2006. Can I Add a Secure VoIP Call?. Washington, DC, USA, IEEE Computer Society.

11. Pelaez, J. C., Fernandez, E. B., Larrondo-Petrie, M. M. & Wieser, C., 2007. Misuse patterns in VoIP. New York, ACM.

12. Radmand, P. et al., 2011. The impact of security on VoIP call quality. Journal of Mobile Multimedia, 7(1), pp. 113-128.

13. Radmand, P. & Talevski, A., 2010. Impact of Encryption on QoS in VoIP. Washington, IEEE.

14. Radman, P. et al., 2010. VoIP: Making Secure Calls and Maintaining High Call Quality. Paris, France, ACM.

15. Sicker, D. C. & Lookabaugh, T., 2004. VoIP Security: Not an Afterthought. Queue - VoIP, 2(6), p. 56.

16. Walsh, T. J. & Kuhn, D. R., 2005. Challenges in Securing Voice over IP. IEEE Security and Privacy, 3(3), pp. 44-49.

17. Wang, X., Chen, S. & Jajodia, S., 2005. Tracking Anonymous PeertoPeer VoIP Calls on the Internet. Alexandra, Virginia, USA, ACM.

18. Zhang, R. et al., 2009. On the Feasibility of Launching the Man-In-The-Middle Attacks on VoIP from Remote Attackers. Sydney, NSW, Australia, ACM.

Download full paperFile format: .doc, available for editing
Contact Us