Areo, 2024 - Google Patents
Transforming Communication: A Critical Review of VoIP and Its Role in Global NetworkingAreo, 2024
View PDF- Document ID
- 14884314063790855026
- Author
- Areo G
- Publication year
External Links
Snippet
Abstract Voice over Internet Protocol (VoIP) has transformed the telecommunications landscape, offering a cost-effective and flexible alternative to traditional circuit-switched networks. By leveraging the internet for voice transmission, VoIP has enabled businesses …
- 238000004891 communication 0 title abstract description 91
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Keromytis | A comprehensive survey of voice over IP security research | |
US8161540B2 (en) | System and method for unified communications threat management (UCTM) for converged voice, video and multi-media over IP flows | |
US9380030B2 (en) | Firewall traversal for web real-time communications | |
US20150040220A1 (en) | System and Method for Unified Communications Threat Management (UCTM) for Converged Voice, Video and Multi-Media Over IP Flows | |
Suthar et al. | A comprehensive study of VoIP security | |
Ramly et al. | Review and enhancement of VoIP security: Identifying vulnerabilities and proposing integrated solutions | |
Adenekan | Design and security implementation of an Asterisk-based VoIP system: Enhancing protection across VoIP networks | |
Ayokunle | Integrating Voice over Internet Protocol (VoIP) technology as a communication tool on a converged network in Nigeria | |
Kumar et al. | Security and challenges in voice over internet protocols: a survey | |
Carvajal et al. | Detecting unprotected SIP-based Voice over IP traffic | |
Areo | Transforming Communication: A Critical Review of VoIP and Its Role in Global Networking | |
Phithakkitnukoon et al. | Voip security—attacks and solutions | |
US10666691B2 (en) | Dynamic session classification | |
Jahanirad et al. | Security measures for VoIP application: A state of the art review | |
Dakur et al. | Eavesdropping and interception security hole and its solution over VoIP service | |
Velianitis et al. | Comparison of VoIP and TETRA Regarding Security in a Safety Critical Environment. | |
Lamba et al. | Security traits of VoIP | |
US12035138B2 (en) | Method and network system for defeating media-coordinated attacks on emergency call networks | |
Adenekan | An In-Depth Guide to Voice over Internet Protocol (VoIP) | |
Areo | Evaluating the Feasibility of VoIP Integration in the MYSEA Environment: Challenges and Opportunities | |
Ylli et al. | EXPLOITING VOIP SECURITY ISSUES IN A CLASSIC SCENARIO | |
Moore | Denial-of-Service (Dos) Attacks Against the Availability of the Next Generation 911 (NG9-1-1) System | |
Neacşu et al. | An analysis of security threats in VoIP communication systems | |
Akinbami et al. | Developing best practices for securing VoIP communication for a non-profit organization | |
Verma et al. | Analysis of various possible threats in voip in order to design network security mechanism |