Parada, 2008 - Google Patents
Impacto de Mecanismos de Segurança em Redes na Telefonia IPParada, 2008
- Document ID
- 13200951307414550218
- Author
- Parada S
- Publication year
- Publication venue
- PQDT-Global
External Links
Snippet
This dissertation is about the impact of secure network environments on speech quality of IP Telephony. Results of the analysis of voice over different unsecure and secure communication links, such as IPsec and TLS, are presented. The use of secure network …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0485—Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
- H04L29/0602—Protocols characterised by their application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kuhn et al. | Security considerations for voice over IP systems | |
Barman et al. | PriFi: Low-latency anonymity for organizational networks | |
Anwar et al. | Multiple design patterns for voice over IP (VoIP) security | |
Palmieri et al. | Providing true end-to-end security in converged voice over IP infrastructures | |
Sadiwala | Analysis of security threats of VoIP systems | |
Li et al. | VoIP secure session assistance and call monitoring via building security gateway | |
Bilien | Key Agreement for secure Voice over IP | |
Bou Diab et al. | Critical vpn security analysis and new approach for securing voip communications over vpn networks | |
Clayton | Securing media streams in an Asterisk-based environment and evaluating the resulting performance cost | |
Callegari et al. | Security and delay issues in SIP systems | |
Parada | Impacto de Mecanismos de Segurança em Redes na Telefonia IP | |
Salama et al. | Performance analysis of transmitting voice over communication links implementing ipsec | |
Yeun et al. | Practical implementations for securing voip enabled mobile devices | |
Alhayajneh et al. | Quality of Service Analysis of VoIP Services | |
Floroiu et al. | A comparative analysis of the security aspects of the multimedia key exchange protocols | |
Ghazali | Improved Performance of Secured VoIP Via Enhanced Blowfish Encryption Algorithm | |
Detken et al. | VoIP security regarding the open source software Asterisk | |
Kuhn et al. | SP 800-58. Security Considerations for Voice Over IP Systems | |
Ashouri et al. | VoIP performance comparison in wireless networks with different encryption methods | |
Berthelot | Performance-cost Analysis of Secure Media-streams in VoIP Systems | |
Abdellatef | Implementation and Performance Analysis of Voice over IP Encryption System | |
نور الدين كمال محمود جبالي | Extending AES with DH Key-Exchange to Enhance VoIP Encryption in Mobile Networks | |
Leggieri et al. | Quality assessment of secure VoIP communications | |
Al-Bataineh | Secure Architecture to Build a Trust Relationship among Anonymous Voice Service Providers Over the Public Internet | |
Moon et al. | Securing VOIP networks via Transport protocols Layer |