Secure VoIP protocols, its comparison and performance analysis
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F12%3APU98573" target="_blank" >RIV/00216305:26220/12:PU98573 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Secure VoIP protocols, its comparison and performance analysis
Popis výsledku v původním jazyce
Due to the importance of VOIP and the advantages that it offers, which the standard telephone systems are not able to offer, especially the cost issues, it's a very important need to facilitate the performance of VOIP system. Among many challenges that face VOIP such as Quality of service, susceptibility to power failure, etc. Security concerns seem to be the most important. VOIP has a different architecture than traditional networks ,and the assumption that since voice packets are being digitized thennormal security mechanisms that are applied to data networks could be applied to VOIP is not ideal, this made it a challenge for designers to consider VOIP security issues. Some of the methods of attacking VOIP resources are denial-of-service (DOS), man-in-the-middle (spoofing), eavesdropping, etc. All of them attack the voice conversations, as well as other confidential data. This paper is not aimed to say which security mechanism is better than the other, because each mechanism has its
Název v anglickém jazyce
Secure VoIP protocols, its comparison and performance analysis
Popis výsledku anglicky
Due to the importance of VOIP and the advantages that it offers, which the standard telephone systems are not able to offer, especially the cost issues, it's a very important need to facilitate the performance of VOIP system. Among many challenges that face VOIP such as Quality of service, susceptibility to power failure, etc. Security concerns seem to be the most important. VOIP has a different architecture than traditional networks ,and the assumption that since voice packets are being digitized thennormal security mechanisms that are applied to data networks could be applied to VOIP is not ideal, this made it a challenge for designers to consider VOIP security issues. Some of the methods of attacking VOIP resources are denial-of-service (DOS), man-in-the-middle (spoofing), eavesdropping, etc. All of them attack the voice conversations, as well as other confidential data. This paper is not aimed to say which security mechanism is better than the other, because each mechanism has its
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
JA - Elektronika a optoelektronika, elektrotechnika
OECD FORD obor
—
Návaznosti výsledku
Projekt
Výsledek vznikl pri realizaci vícero projektů. Více informací v záložce Projekty.
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2012
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Proceedings of the 2012 International Conference on Telecommunication Systems
ISBN
978-0-9820958-6-7
ISSN
—
e-ISSN
—
Počet stran výsledku
4
Strana od-do
150-153
Název nakladatele
ATSMA
Místo vydání
Praha
Místo konání akce
Praha
Datum konání akce
24. 5. 2012
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—