A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

被引:0
|
作者
Omari, Ahmed H. Al [1 ]
Alsariera, Yazan A. [1 ]
Alhadawi, Hussam S. [2 ]
Albawaleez, Mahmoud A. [3 ]
Alkhliwi, Sultan S. [1 ,3 ]
机构
[1] Northern Border Univ, Dept Comp Sci, Collage Sci, Ar Ar, Saudi Arabia
[2] Dijlah Univ Coll, Dept Comp Techn Engn, Baghdad 10011, Iraq
[3] Northern Border Univ, Informat Technol, Ar Ar, Saudi Arabia
关键词
VOIP Security; Attacks; SIP; Confidentiality; Integrity; availability;
D O I
10.22937/IJCSNS.2022.22.2.23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.
引用
收藏
页码:175 / 184
页数:10
相关论文
共 50 条
  • [1] A Closer Look at the Security Risks in the Rust Ecosystem
    Zheng, Xiaoye
    Wan, Zhiyuan
    Zhang, Yun
    Chang, Rui
    Lo, David
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2024, 33 (02)
  • [2] An efficient approach for NAT traversal problem on security of Voice over Internet Protocol
    Khirul, Ifta
    Islam, Md. Kamrul
    Hasan, K. A. Azharul
    PROCEEDINGS OF 10TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT 2007), 2007, : 146 - 150
  • [3] New voice over Internet protocol technique with hierarchical data security protection
    Guo, JI
    Yen, JC
    Pai, HF
    IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (04): : 237 - 243
  • [4] Security enhancement of voice over Internet protocol using speaker recognition technique
    Ibrahim, Q.
    Abdulghani, N.
    IET COMMUNICATIONS, 2012, 6 (06) : 604 - 612
  • [5] VoIP (Voice over Internet protocol)
    Davies, D
    CANADIAN MINING JOURNAL, 2005, 126 (06) : 9 - 9
  • [6] Securing Voice over Internet Protocol
    Ghafarian, Ahmad
    Draughorne, Randolph
    Hargraves, Shelley
    Grainger, Steven
    High, Stacy
    Jackson, Crystal
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (03): : 200 - 204
  • [7] VoIP (Voice over Internet Protocol)
    Davies, Dan
    Canadian Mining Journal, 2005, 126 (06):
  • [8] Voice over Internet protocol (VoIP)
    Goode, B
    PROCEEDINGS OF THE IEEE, 2002, 90 (09) : 1495 - 1517
  • [9] VoIP (Voice over Internet Protocol)
    Davies, D
    PULP & PAPER-CANADA, 2005, 106 (05) : 15 - 15
  • [10] Voice over Internet Protocol - telephoning via Internet
    Banach, Artur
    E-MENTOR, 2005, (03): : 61 - 64