26,182 Hits in 1.9 sec


Pedram Radman, Jaipal Singh, Marc Domingo, Joan Arnedo, Alex Talevski
2010 Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia - MoMM '10  
This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP).  ...  The results of laboratory tests indicate that the impact on the overall performance of VoIP depends upon the bandwidth availability and encryption algorithm used.  ...  VoIP Quality of Service (QoS) QoS is a major requirement in VoIP implementations.  ... 
doi:10.1145/1971519.1971532 dblp:conf/momm/RadmandSDAT10 fatcat:leaisxdjwncrbpivdc2bb5do64

VoIP defender

Jens Fiedler, Tomas Kupka, Sven Ehlert, Thomas Magedanz, Dorgham Sisalem
2007 Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications - IPTComm '07  
In this article we present VoIP Defender, a generic security architecture, called VoIP-Defender, to monitor, detect, analyze and counter attacks relevant for a SIP-based VoIP infrastructure.  ...  The increasing number of customers using VoIP makes VoIP services a valuable target for attackers that want to bring down the service, take it over or simply abuse it to distribute their own content, like  ...  RELATED WORK Several researchers have prosed VoIP security solutions to detect and prevent VoIP-related attacks.  ... 
doi:10.1145/1326304.1326307 dblp:conf/iptcomm/FiedlerKEMS07 fatcat:lnvljzhqsfbmxpx7criz4t3abu

VoIP Fraud

Hemant Sengar
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
To this end, we introduce a new dimension to VoIP security, namely device authorization along with already existing and widely deployed user authentication.  ...  The answer to this question and a feasible solution could be proved as an essential security tool to prevent various VoIP attacks that plague IP telephony world.  ...  of carrier grade VoIP and network elements.  ... 
doi:10.1145/2660267.2660284 dblp:conf/ccs/Sengar14 fatcat:tw6z22cvprf4jg3j7abujwwnpu

Small World VoIP [chapter]

Xiaohui Yang, Angelos Stavrou, Ram Dantu, Duminda Wijesekera
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
P2P VoIP systems.  ...  We present the analysis and design of a Small World VoIP system (SW-VoIP) which is geared towards customers that are communicating with their Small World of social contacts.  ...  Join and Leave SW-VoIP nodes participate in a P2P VoIP network using normal P2P protocols.  ... 
doi:10.1007/978-3-642-29336-8_8 fatcat:pmeu564udbc5tpgk2jpxvtp4aa

VoIP Honeypot Architecture

Mohamed Nassar, Radu State, Olivier Festor
2007 2007 10th IFIP/IEEE International Symposium on Integrated Network Management  
VoIP security extends the existent risk range of IP protocols and infrastructures and introduces new attacks as well.  ...  Voice Over IP (VoIP) or telephony services over Internet announces a new revolution in the telecommunication world for its management simplicity and cost reduction.  ...  In the next section, we go through an overview of the VoIP threats. We debate about the research challenges of the VoIP security in section III.  ... 
doi:10.1109/inm.2007.374775 dblp:conf/im/NassarSF07 fatcat:nvsvs7jxzjft3kjavpt4ipyhua

VoIP and Voice over LTE

2015 International Journal of Science and Research (IJSR)  
This research paper describes two possible approaches that enable the use of voice and SMS services in LTE: the utilisation of VoIP techniques and the use of the existing 2G or 3G mobile network infrastructures  ...  Partnership with existing VoIP service providers One possible implementation is realised through the support of existing VoIP services such as Skype.  ...  To set up a call, the LTE UE transmits VoIP signaling messages (in form of normal packet data) to the VoIP server, which then exchanges similar messages with the other UE (either packet data or a circuit  ... 
doi:10.21275/v4i12.nov151896 fatcat:as3tkon4kvfrrolx4wytvx44tu

VoIP Forensic Analyzer

M Mohemmed, Manesh T, Saied M.
2016 International Journal of Advanced Computer Science and Applications  
This forensic activity includes spotting and scrutinizing the network patterns of VoIP-SIP stream, which is used to initiate a session for the communication, and regenerate the content from VoIP-RTP stream  ...  This paper presents an idea of a framework for the forensic analysis of the VoIP traffic over the network.  ...  VoIP Forensic player G.  ... 
doi:10.14569/ijacsa.2016.070116 fatcat:zemrrbw5hbbovkonb3gzre2riy

VoIP Quality Assessment Technologies [chapter]

Mousa Al-Akhras, Iman Al
2011 VoIP Technologies  
VoIP Technologies Transmission Quality, International Telecommunication Union-Telecommunication Standardization Sector (ITU-T). ITU-T (1998). Recommendation P.  ...  R-Rating Factor from equation 18 VoIP Technologies VoIP Quality Assessment Technologies 19 Table 2.  ...  Categories of VoIP quality assessment technologies VoIP quality assessment methods can be categorised into either subjective methods or objective methods.  ... 
doi:10.5772/14438 fatcat:rzxewbsqcbhr3klyzy5lybhlxq

VoIP System for Enterprise Network [chapter]

Moo Wan, Fumikazu Iseki
2011 VoIP Technologies  
VoIP system developed in Intranet 4. VoIP System based on Asterisk 4.1 Photo 1. Grandstream BT101 as IP Phone Photo 3. Grandstream HT286 as VoIP Adaptor Photo 2.  ...  VoIP system in IntranetFig.2shows the VoIP system that we have developed by using an Asterisk in the Intranet environment (i.e. enterprise network).  ...  VoIP System for Enterprise Network, VoIP Technologies, Dr Shigeru Kashihara (Ed.), ISBN: 978-953-307-549-5, InTech, Available from:  ... 
doi:10.5772/14405 fatcat:l45nzvudfbcozl2hj2i6cogof4

Analysis and Simulation of Wired VoIP Networks compared to Wireless VoIP

Eliud M. Manyinsa, S. Musyoki, H. Tarus
2016 IOSR Journal of Electrical and Electronics Engineering  
The paper evaluates the performance difference between wired and wireless VoIP networks.  ...  In this study we present a VoIP system using Local Area Network (LAN) and Wireless Local Area Network (WLAN) for connectivity.  ...  After forty years of developments, VoIP has become a very mature communication protocols. VoIP was implemented in MSN in 2005.  ... 
doi:10.9790/1676-1104043541 fatcat:jcarjsa4snalpciejkecaxrxty

System for Rogue VoIP Phone Detection and Managing VoIP Phone Mobility

2019 International journal of recent technology and engineering  
The quickly propelling Voice over Internet Protocol (VoIP) innovation, is picking up customer fascination in the business today.  ...  The real drawback, keeping numerous organizations off from utilizing VoIP advances is related to the security of this framework.  ...  Kitani, Kagawa University and is exposed to VoIP communication. IV. VOIP ATTACKS These segment subtleties various sorts of VoIP strikes. A.  ... 
doi:10.35940/ijrte.b2080.078219 fatcat:imfiapfjm5c5dog7kxhkmcu2sa

Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System

2012 International journal of network security and its applications  
This paper provides a comprehensive comparison of a VoIP SIP protocol and CISCO VoIP system.  ...  VoIP is an application running on the internet, and therefore inherits the internet's security issues.  ...  As VoIP is very sensitive to delay (delayed -sensitive), a well-engineered, end-to end network is necessary to use VoIP successfully [6] .  ... 
doi:10.5121/ijnsa.2012.4409 fatcat:7q4u42bpgbgyhcegwds67sevae

Admission Control for VoIP Networks

Yuichiro Toyama, Kenichi Mase, Naoyuki Karasawa
2001 ITE Technical Report  
VolP 呼 の 接続 可 否 を 決 定 す る 際 ,試 験 フ ロ ー の パ ケ ッ ト損 失 率 を 判 定 条 件 と し て 用 い ,ある閾値 以 下 で あ っ た 場 合 に の み VolP 呼 の 接 続 を 許 可 す る . ( 4)VoIP 呼 の 開 始 .  ...  発 呼 側 着 呼 側 ゲ ー トキ ー パ ゲ ー トキ ー パ エ ン ドポ イ ン ト エ ン ドポ イ ン ト 接 続 可 否 判 断 T ア ド レ ス 解 決 等 / 1P コ ネ ク シ ョ ン 砥 立 接 続 要 求 試 験 フ ロ ー の 生 成 接続 応答 VoIP 呼 の 開 始 図 1 従 来 法 の シ ー ケ ン ス 3.提 案 方 法 提 案 方 法 で は ,呼 毎  ... 
doi:10.11485/itetr.25.44.0_29 fatcat:pv74vptsi5eeto2xp5g4wwqk3u

Deploying VoIP in Existing IP Networks [chapter]

Khaled Salah
2008 VoIP Handbook  
What are the QoS requirements for VoIP? How will the new VoIP load impact the QoS for currently running network services and applications?  ...  VoIP requires timely packet delivery with low latency, jitter, packet loss, and sufficient bandwidth.  ...  VoIP QoS.  ... 
doi:10.1201/9781420070217.pt1 fatcat:p6s5qcrs6jhsbarhnxtswj6574

Assessment of Speech Quality in VoIP [chapter]

Zdenek Becvar, Michal Vondra, Lukas Novak
2011 VoIP Technologies  
Introduction In VoIP (Voice over Internet Protocol), the voice is transmitted over the IP networks in the form of packets.  ...  The next section gives an overview on the related work in the field of VoIP speech quality. The third one describes basic principles of the speech quality assessment.  ...  Conclusions This chapter provides an overview on the speech quality assessment in VoIP networks.  ... 
doi:10.5772/13513 fatcat:p7s5kj6r75hj3clrfkgq2dbow4
« Previous Showing results 1 — 15 out of 26,182 results