A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

被引:0
|
作者
Omari, Ahmed H. Al [1 ]
Alsariera, Yazan A. [1 ]
Alhadawi, Hussam S. [2 ]
Albawaleez, Mahmoud A. [3 ]
Alkhliwi, Sultan S. [1 ,3 ]
机构
[1] Northern Border Univ, Dept Comp Sci, Collage Sci, Ar Ar, Saudi Arabia
[2] Dijlah Univ Coll, Dept Comp Techn Engn, Baghdad 10011, Iraq
[3] Northern Border Univ, Informat Technol, Ar Ar, Saudi Arabia
关键词
VOIP Security; Attacks; SIP; Confidentiality; Integrity; availability;
D O I
10.22937/IJCSNS.2022.22.2.23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.
引用
收藏
页码:175 / 184
页数:10
相关论文
共 50 条
  • [21] Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls
    Epiphaniou, G.
    Maple, C.
    Sant, P.
    Safdar, G. A.
    IET INFORMATION SECURITY, 2012, 6 (03) : 141 - 148
  • [22] Improving quality of service for internet protocol television and voice over internet protocol over long-term evolution networks
    Samrah, Ahmed Shaban
    Khalil, Abeer Twakol
    Ibrahim, Hegazi M.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2019, 22 (04) : 409 - 446
  • [23] Providing true end-to-end security in converged voice over IP infrastructures
    Palmieri, Francesco
    Fiore, Ugo
    COMPUTERS & SECURITY, 2009, 28 (06) : 433 - 449
  • [24] The Current State of Voice over Internet Protocol in Wireless Mesh Networks
    Meeran, Mohammad Tariq
    Annus, Paul
    Le Moullec, Yannick
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 2567 - 2575
  • [25] Optimising no acknowledgment policy on WLANs supporting voice over internet protocol
    Politis, A.
    Hilas, C. S.
    Papatsoris, A. D.
    ELECTRONICS LETTERS, 2014, 50 (01) : 51 - 51
  • [26] Covert voice over internet protocol communications based on spatial model
    HUANG YongFeng
    TANG ShanYu
    Science China(Technological Sciences) , 2016, (01) : 117 - 127
  • [27] Small office PBX using voice over Internet Protocol (VOIP)
    Alam, Md. Zaidul
    Bose, Saugata
    Rahman, Md. Mhafazur
    Al-Mumin, Mohammad Abdullah
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1618 - +
  • [28] Identifying the Main Paths of Knowledge Diffusion in the Voice over Internet Protocol
    Chen, Liang-Chu
    Shih, I-Chiang
    Liu, John S.
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (01): : 85 - 98
  • [29] Secure Voice Over Internet Protocol(VoIP) Network with Biometric Key
    Bhuvaneshwari, S.
    Arul, P.
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 1431 - 1435
  • [30] A new approach to authenticating and encrypting Voice over Internet Protocol communications
    Lago-Fernandez, J.
    Gil-Castineira, F.
    Gonzalez-Castano, F. J.
    Roman-Portabales, A.
    SOFTWARE-PRACTICE & EXPERIENCE, 2014, 44 (05): : 593 - 619