Essays about: "security of voip"

Showing result 1 - 5 of 26 essays containing the words security of voip.

  1. 1. SIPman : A penetration testing methodology for SIP and RTP

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Elin Wallgren; Christoffer Willander; [2022]
    Keywords : Session Initiation Protocol; Real-time Transport Protocol; penetration testing; methodology; Voice over IP; Session Initiation Protocol; Real-time Transport Protocol; penetrationstestning; metod; Voice over IP;

    Abstract : Background. SIP and RTP are two protocols that are widely used, and they play an important role in VoIP services. VoIP is an integral part of many communication services, e.g. READ MORE

  2. 2. Homomorphic Encryption for Audio Conferencing

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Herman Nordin; Ebba Lindström; [2022]
    Keywords : Homomorphic encryption; VoIP; security; audio conferencing; cryptography;

    Abstract : Homomorphic encryption (HE) enables computations on encrypted data making it possible to perform calculations on a server without sharing the secret key for decryption. HE is relatively new and has seen significant improvements in recent years in terms of speed of encryption, decryption, operations, and the number of operations possible to perform in a row without damaging the ciphertext. READ MORE

  3. 3. Protocol-aware fuzzing of DTLS

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Rahbar Ghori; [2021]
    Keywords : ;

    Abstract : Communication protocols like TCP and UDP enable transfer of databetween sender and receiver during online communication. To provide security from eavesdropping, message forgery and data tampering during online communication, communication protocols likeTLS and DTLS are run on top of TCP/UDP. READ MORE

  4. 4. On the security of VoIP mobile network operator and international carrier interconnects

    University essay from KTH/Skolan för elektro- och systemteknik (EES)

    Author : Mina Naguib; [2016]
    Keywords : VoIP; Security; TDM; PSTN; International Carrier Network; Mobile Operators; SBC; Signaling;

    Abstract : All Mobile Network Operators (MNOs) as well as international carriers are moving voice services from the legacy Public Switched Telephone Network (PSTN) to Voice over IP (VoIP). The benefit is that VoIP traffic can be easily rerouted at any moment, thus giving companies a variety of options as traffic can be rerouted to any carrier of choice leading to different Quality of Service (QoS) levels (and thus agreements) as well as different prices to choose from. READ MORE

  5. 5. A reverse proxy for VoIP : Or how to improve security in a ToIP network

    University essay from KTH/Kommunikationsnät

    Author : Guillaume Dhainaut; [2016]
    Keywords : VoIP; ToIP; SIP; SIPS; RTP; SRTP; SBC; session border controller; security; toll fraud;

    Abstract : The need for security is crucial in Telephony over IP (ToIP). Secure protocols have been designed as well as specific devices to fulfill that need. This master thesis examines one of such devices called Session Border Controller (SBC), which can be compared to reverse proxies for ToIP. The idea is to apply message filters to increase security. READ MORE