[go: up one dir, main page]

Areo, 2024 - Google Patents

Transforming Communication: A Critical Review of VoIP and Its Role in Global Networking

Areo, 2024

View PDF
Document ID
14884314063790855026
Author
Areo G
Publication year

External Links

Snippet

Abstract Voice over Internet Protocol (VoIP) has transformed the telecommunications landscape, offering a cost-effective and flexible alternative to traditional circuit-switched networks. By leveraging the internet for voice transmission, VoIP has enabled businesses …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Similar Documents

Publication Publication Date Title
Keromytis A comprehensive survey of voice over IP security research
US8161540B2 (en) System and method for unified communications threat management (UCTM) for converged voice, video and multi-media over IP flows
US9380030B2 (en) Firewall traversal for web real-time communications
US20150040220A1 (en) System and Method for Unified Communications Threat Management (UCTM) for Converged Voice, Video and Multi-Media Over IP Flows
Suthar et al. A comprehensive study of VoIP security
Ramly et al. Review and enhancement of VoIP security: Identifying vulnerabilities and proposing integrated solutions
Adenekan Design and security implementation of an Asterisk-based VoIP system: Enhancing protection across VoIP networks
Ayokunle Integrating Voice over Internet Protocol (VoIP) technology as a communication tool on a converged network in Nigeria
Kumar et al. Security and challenges in voice over internet protocols: a survey
Carvajal et al. Detecting unprotected SIP-based Voice over IP traffic
Areo Transforming Communication: A Critical Review of VoIP and Its Role in Global Networking
Phithakkitnukoon et al. Voip security—attacks and solutions
US10666691B2 (en) Dynamic session classification
Jahanirad et al. Security measures for VoIP application: A state of the art review
Dakur et al. Eavesdropping and interception security hole and its solution over VoIP service
Velianitis et al. Comparison of VoIP and TETRA Regarding Security in a Safety Critical Environment.
Lamba et al. Security traits of VoIP
US12035138B2 (en) Method and network system for defeating media-coordinated attacks on emergency call networks
Adenekan An In-Depth Guide to Voice over Internet Protocol (VoIP)
Areo Evaluating the Feasibility of VoIP Integration in the MYSEA Environment: Challenges and Opportunities
Ylli et al. EXPLOITING VOIP SECURITY ISSUES IN A CLASSIC SCENARIO
Moore Denial-of-Service (Dos) Attacks Against the Availability of the Next Generation 911 (NG9-1-1) System
Neacşu et al. An analysis of security threats in VoIP communication systems
Akinbami et al. Developing best practices for securing VoIP communication for a non-profit organization
Verma et al. Analysis of various possible threats in voip in order to design network security mechanism