Voice over Internet Protocol (VoIP) Security Affects on the IP Network Architecture [email_address] Conference ICS – Wireless Group Meeting Tempe, Arizona February 6, 2005 Jose J. Valdes, Jr. Colorado State University
“ Today’s networks are being architected with converged, real time, voice, data, and video applications in mind.” (1)
“ It is this ability to integrate voice, data, and video applications using a single network infrastructure that makes deployment of IP telephony platform a essential step toward creating a next-generation network.” (1)
The next-generation network has different and extended architectural requirements, in part because of VoIP, e.g., security.
ITU – T H.234 v2 & v3 defines different security profiles for product interoperability under the H.323 suite of protocols’ Annex D, E, and F. Suite designed for real time audio, video, multimedia, and data.
SIP security features described in RFC 3261 (IETF). Designed for VoIP and updated for video and messaging.
Some will argue that these protocols were designed from different perspectives.
Broadcom. “Critical Steps for Successful VoIP Deployment.” White Paper October 2004 Broadcom Corporation Irvine, CA.
Shore, Joel. “IP Telephony Security: An Overview.” NetworkWorld URL: [email_address]
Kuhn, R.D., Walsh, T.J., & Fries, S., “Security Considerations for Voice Over IP Systems: Recommendations of the National Institute of Standards and Technology.” National Institute of Standards and Technology, Gaithersburg, MD. January 2005.
Cisco. “Internetworking Technology Handbook.” 2003. URL: http://www.cisco.com/univercd/cc/td/doc/cisintwrk/ito_doc (26 October 2004)
Tucker, G.S., “Voice Over Internet Protocol (VoIP) and Security.” GIAC Security Essentials Certification (GSEC), v1.4c, option 1, 26 October 2004