Voip security — attacks and solutions

7Citations
Citations of this article
52Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Voice over IP (VoIP) technology is being extensively and rapidly deployed. Flexibility and cost efficiency are the key factors luring enterprises to transition to VoIP. Some security problems may surface with the widespread deployment of VoIP. This article presents an overview of VoIP systems and its security issues. First, we briefly describe basic VoIP architecture and its fundamental differences compared to PSTN. Next, basic VoIP protocols used for signaling and media transport, as well as defense mechanisms are described. Finally, current and potential VoIP attacks along with the approaches that have been adopted to counter the attacks are discussed. © 2008 Taylor & Francis.

Cite

CITATION STYLE

APA

Phithakkitnukoon, S., Dantu, R., & Baatarjav, E. A. (2008). Voip security — attacks and solutions. Information Security Journal, 17(3), 114–123. https://doi.org/10.1080/19393550802308618

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free