SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 6 
SECURING VOIP COMMUNICATIONS IN AN OPEN NETWORK Mukund Sarma1 1Dept. of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Amrita School of Engineering, Amritanagar, Coimbatore, India, 641112. Abstract Channeling voice calls over IP networks has brought many advantages to enterprise communications, but it also creates some security risks. In this paper a technique to enhance the security of vocal and text communication is proposed. This technique is a combination of multipath routing and secret sharing scheme. Information is conveyed securely from one person to another over an open network using the secret sharing scheme. The original data is divided into two shares and each of these shares is sent over the open network through multiple different paths using the multipath routing technique. In case of a man-in-the-middle attack the person will not obtain any information of the original form with only one of the shares. Only if the person collects both the shares he/she can reconstruct the original information. A mechanism to secure SIP (Session Initiation Protocol) and text communication is also discussed in this paper. Keywords: VoIP, Secret sharing scheme, Multipath routing, Speech compression, RTP, TLS, SIP. 
---------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION In the early days of VoIP, there was no big concern about security issues related to its use. People were mostly concerned with its cost, functionality and reliability. Now that VoIP is gaining wide acceptance and becoming one of the mainstream communication technologies, security has become a major issue. .There are many security concerns in VoIP such as denial of service, alternation of voice stream, eavesdropping, redirection of call, data manipulation, caller ID imitation and man in the middle attacks.[1][2] To understand these concerns and know how handle them, the architecture of VoIP needs to be understood clearly. In the public switched telephone networks (PSTN) the entire communication paths were administered by officials. So the risk of man-in-the- middle attack is not as high as in the case of VoIP which has multiple intermediate exits between the two users. As a developer, to understand what the security risks in VoIP are, he/she needs to understand the architecture and working of VoIP. Figure 1 depicts the software architecture of VoIP. This architecture is similar to that of Linphone’s software architecture. [15] 
Fig 1 Software architecture of VoIP Working of VoIP: The caller starts to speak once a call has been set up between two, or more, VoIP devices. At this point the voice signal is converted into a digital signal, formatted for transmission and sent along the network to the destination, where all of the preceding steps have to be reversed.[3] Figure 2 describes the architecture diagram of how VoIP works.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 7 
Steps: 
1. First the ADC converts analog voice to digital signals (bits) 
2. Now the bits are compressed in a format which is best for 
transmission 
3. The payload (voice packets) are inserted in data packets 
using a real-time protocol (typically RTP over UDP over IP) 
4. A signaling protocol is needed to call users: SIP (Session-initiation 
protocol) does that. 
5. At the other end packets are disassembled, data is extracted 
and then they converted to analog voice signals and sent to the 
phone. 
6. Quality of Service (QoS) makes sure all this happens in the 
real time as one cannot wait for too long for a reply. 
Fig 2 Working of VoIP 
While circuit switching keeps the connection open and 
constant, packet switching opens a brief connection long 
enough to send a packet, from one system to another. The 
sending device (computer/phone) opens a port/channel and 
sends the packet. . The risk of man-in-the-middle attack is 
high in the case of VoIP which has multiple intermediate exits 
between the two users. 
Man-in-the-middle attacks, eavesdropping and data 
manipulation can happen as voice traffic travels over the 
Internet. It is relatively easy for someone to eavesdrop on the 
media stream and obtain data. In order to prevent 
eavesdropping, a set of security protocols, called IPsec, is used 
to apply encryption to the digitized voice stream for VoIP. But 
this again involves key exchange and is vulnerable to man-in-the- 
middle attacks. 
Caller ID manipulation, redirection of a call, hijacking the 
session by registering happens when an attacker postures as a 
valid VoIP user and then hack into the system. Hijacking is 
possible because the signaling messages that the SIP sends as 
plain text with no guarantee that the data that is received at the 
receivers end is indeed the data sent by the user. 
2. SECURING VOICE CALLS IN THE PROPOSED 
METHOD 
Voice is first converted from analog to digital (bits) using an 
ADC (Analog to Digital Converter). The steps involved in 
digitizing voice include sampling, quantizing, silent 
suppression and compression. Since it is a vocal call, even if 
there is a small loss in data it won’t affect the conversation. So 
a lossy compression minimizes the amount of data that needs 
to be transmitted. Codecs such as opus, SILK, speex, PCMU, 
iSAC etc. can be used for compression of data. [4][5] The SIP 
server chooses which type of codec is to be used for the call. 
The compressed data is cut into a constant size of 256 bits. 
This 256 bit alphanumeric string is then divided into two equal 
strings. These two 128 bit strings are converted into images. 
Visual cryptography is applied on these two images and these 
are now called shares. These shares are then sent on the open 
network using the concept of multipath routing. At the other 
end these shares are joined together and decrypted to get the 
message back in its original form. The use of visual sharing 
scheme eliminates the risk of eavesdropping. Another 
advantage of using the shares is that it does not require any 
key exchange. Since both the shares are sent on two random 
ports, even if there is a man-in-the-middle-attack he will not 
be able to modify the data. Figure 3 describes the working of 
the proposed method. [6] 
Fig 3 Working of the proposed method SH1 and SH2 are 
shares 1, 2 respectively.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 8 
Working of Shamir’s Visual Sharing Scheme: 
Visual secret sharing schemes (VSS) represents the particular 
case of secret sharing scheme where the shares are images. 
Naor and Shamir were the first to introduce them as a part of 
visual cryptography [7] [8] [9]. Each image (share) is 
considered to be a matrix of pixels. By convention, in black-and- 
white representation, a white pixel is represented by 0 and 
a black pixel is represented by 1. 
Example of Naor-Shamir VSS for two participants or two 
devices 
Corresponding shares in Shamir’s VSS with 2 participants in 
the pixel notation are shown in Table 1. [10] 
Table 1 All possible shares in Shamir’s VSS with 2 
participants 
Figure 4 shows how the digitized 512 bit number is converted 
to shares and how the two shares are overlapped to get back 
the original data. 
Fig 4 Shares of a 512 bit digitized string 
Multipath Routing: 
Multipath routing is a technique that allows data to be sent 
over multiple alternate paths. This is in contrast to a single 
routing protocol, where a data stream is directed along a single 
path from a sourceto a destination. With multiple paths, the 
source and destination pair can use any number of alternate 
routes to achieve performance enhancements, connection 
stability, and potential security improvements. Unlike single-path 
algorithms, these multipath algorithms permit traffic 
multiplexing over multiple lines. 
The data (share) is secure when communications are 
distributed across multiple paths. Here, instead of an intruder 
observing a common route, as in the case of single path 
routing, the data is spread out among alternate routes. This 
makes it difficult for an attacker to determine all the possible 
routes for a communication and thereby limit his/her 
interception of the data to a very small volume if one of the 
routes is being observed. Several methods have been studied 
in finding out disjoint paths. The concept of disjoint multipath 
routing is used to send packets for a particular session. [11] 
[12]
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 9 
3. SECURING TEXT COMMUNICATIONS IN THE PROPOSED METHOD VoIP applications make use of SIMPLE (Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions) an instant messaging and presence protocol suite based on Session Initiation Protocol (SIP). SIP is a signaling protocol, used for controlling multimedia communication sessions such as voice and video calls over the Internet. The protocol governs establishment, termination and other essential elements of a call. Messages sent are in the form of Plain text. Any intruder will be able to find out the user name, password and the data. The authentication (The users identity), Integrity (Is the message received the same as the one sent?), privacy and confidentiality (Is someone listening to the conversation?) are at stake. [13] One way to go about securing SIP is using TLS (Transport Layer Security) in SIP [14]. The other way is to encrypt the messages being sent and received to and from the SIP server. An application is developed at the server side that decrypts the encrypted messages that are being sent from the VoIP devices. If the SIP is not secured, there is a risk of attackers making unauthorized calls and gaining access to the VoIP network. This could lead to the access of private conversations made on the VoIP network thereby modifying the messages if needed or bringing down the entire VoIP network. [13] TLS provides an encrypted channel that can be used to send SIP messages. A public key cryptography algorithm is used to encrypt the messages. 4. SUMMARY The proposed method aims to reduce the security risks involved in VoIP communication. Security risks involving voice communication is reduced using the concept of visual cryptography and multipath routing technique. The Shamir’s visual sharing scheme has been implemented to achieve the secret sharing scheme. The shares generated are then sent over the network using the concept of disjoint multipath routing. The paper also proposes two methods on how to secure text communications in VoIP. The proposed method ensures the security concerns in VoIP such as denial of service, alternation of voice stream, eavesdropping, redirection of call, data manipulation, caller ID imitation and man in the middle attacks are not compromised. ACKNOWLEDGMENTS 
I am highly indebted to Amrita Vishwa Vidyapeetham for their kind co-operation and encouragement which help me in doing this project. I also wish to express sincere gratitude to ADRIN, Department of Space, Government of India for providing me necessary guidance and support required to work on this project. 
REFERENCES [1]. Hung P.C.K., Martin M.V. 2006.”Security Issues in VOIP Applications” Electrical and Computer Engineering Conference (CCECE).ISBN:1-4244-0038-4. pp: 2361-2364. DOI:10.1109/CCECE2006.2777789 [2]. D. Butcher, X. Li, and J. Guo, 2007. Security Challenge and Defense in VoIP Infrastructures, IEEE Trans.Systems, Man, and Cybernetics Part C: Applications and Reviews, vol. 37, no. 6, pp. 1152–1162 [3]. Khaled Salah, “On the Deployment of VoIP in Ethernet Networks: Methodology and Case Study”, Department of Information and Computer Science, King Fahd University of Petroleum and Minerals. http://faculty.kfupm.edu.sa/ics/salah/voiptool/papers/ComComm.pdf [4]. Malik Ahsan Ali, Imran Rashid, Adnan Ahmed Khan, 2013. “Selection of VoIP CODECs for Different Networks based on QoS Analysis”. International Journal of Computer Applications (IJCA), Vol 84 Issue 5, DOI: 10.5120/14575- 2702 [5]. Leigh A. Thorpe, 1999. “Subjective evaluation of speech compression codecs and other non-linear voice-path devices for telephony applications”, International Journal of Speech Technology. vol. 2, pp: 273-288. DOI: 10.1007/BF02108644 [6]. Ryouichi Nishimura, Shun-ichiro Abe, Norihiro Fujita and Yoiti Suzuki, Nobuyuki Enomoto, Tsutomu Kitamura and Atsushi Iwata, 2010 “Reinforcement of VoIP Security with Multipath Routing and Secret Sharing Scheme “Journal of Information Hiding and Multimedia Signal Processing. ISSN 2073-4212. Ubiquitous International Volume 1, Number 3, pp: 204-219. [7]. Moni Naor, Adi Shamir, 1995. “Visual Cryptography”, Advanced in Cryptology – EUROCRYPT’94, LNCS950. Springer-Verlag. pp: 1-12. [8]. C. Blundo, S. Cimato, and A. De Santis, 2006. “Visual Cryptography Schemes with Optimal Pixel Expansion”, Theoretical Computer Science, vol 369, pp: 169– 182. [9]. C. Blundo, A. De Santis, D.R. Stinson, 1999. “On the contrast in visual cryptography schemes”, J. Cryptology, vol 12, pp: 261–289. [10]. Ruxandra Olimid, “Python Implementation of Visual Secret Sharing Schemes”, Journal of Information Systems & Operations Management, Vol.5.2.1. [11]. S.-J. Lee and M. Gerla, 2001. “Split Multipath Routing with Maximally Disjoint Paths in Ad hoc Networks”, Proc. of Int. Conf. on Communications, vol. 10, pp: 3201-3205. [12]. W. Lou and Y. Fang, 2001. “A Multipath Routing Approach for Secure Data Delivery”, Proc. of Military Communications Conference (MILCOM), vol. 2, pp: 1467– 1473
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 10 
[13]. Salsano S, Veltri L, Papalilo D, 2002. “SIP security issues: the SIP authentication procedure and its processing load” Network, IEEE, Vol 16, issue 6, pp: 38-44, DOI: 10.1109/MNET.2002.1081764 [14]. Tadashi Kaji, Kazuyoshi Hoshino, Takahiro Fujishiro, Osamu Takata, Akifumi Yato, Keisuke Takeuchi, Satoru Tezuka, 2006. .” TLS handshake method based on SIP”, Proceedings of the International Multiconference on Computer Science and Information Technology, pp: 467 – 475 [15]. Software Architecture (2014) Available at: http://www.linphone.org/eng/documentation/dev/ (Accessed: 8 Febuary 2014)

More Related Content

What's hot

Secure signature based cedar routing in mobile adhoc networks
Secure signature based cedar routing in mobile adhoc networksSecure signature based cedar routing in mobile adhoc networks
Secure signature based cedar routing in mobile adhoc networks
eSAT Journals
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
eSAT Publishing House
 
50120140507012
5012014050701250120140507012
50120140507012
IAEME Publication
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Eswar Publications
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reordering
iaemedu
 
B43011014
B43011014B43011014
B43011014
IJERA Editor
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
Elanthendral Mariappan
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
IJERA Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detection
iosrjce
 
E42043640
E42043640E42043640
E42043640
IJERA Editor
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
ijwmn
 
Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...
ambitlick
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
557 562
557 562557 562
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
eSAT Publishing House
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
IJMER
 

What's hot (18)

Secure signature based cedar routing in mobile adhoc networks
Secure signature based cedar routing in mobile adhoc networksSecure signature based cedar routing in mobile adhoc networks
Secure signature based cedar routing in mobile adhoc networks
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
 
50120140507012
5012014050701250120140507012
50120140507012
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reordering
 
B43011014
B43011014B43011014
B43011014
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detection
 
E42043640
E42043640E42043640
E42043640
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
557 562
557 562557 562
557 562
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 

Viewers also liked

Building extraction from remote sensing imageries by data fusion techniques
Building extraction from remote sensing imageries by data fusion techniquesBuilding extraction from remote sensing imageries by data fusion techniques
Building extraction from remote sensing imageries by data fusion techniques
eSAT Publishing House
 
An image crawler for content based image retrieval
An image crawler for content based image retrievalAn image crawler for content based image retrieval
An image crawler for content based image retrieval
eSAT Publishing House
 
Feasibility study of concrete based pavement by using fibers & cementing wast...
Feasibility study of concrete based pavement by using fibers & cementing wast...Feasibility study of concrete based pavement by using fibers & cementing wast...
Feasibility study of concrete based pavement by using fibers & cementing wast...
eSAT Publishing House
 
Optimization of physical parameters of α amylase
Optimization of physical parameters of α amylaseOptimization of physical parameters of α amylase
Optimization of physical parameters of α amylase
eSAT Publishing House
 
Construction of sine and cosine hologram of brain tumor image
Construction of sine and cosine hologram of brain tumor imageConstruction of sine and cosine hologram of brain tumor image
Construction of sine and cosine hologram of brain tumor image
eSAT Publishing House
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor network
eSAT Publishing House
 
Degradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution usingDegradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution using
eSAT Publishing House
 
Biochemical and molecular characterization of antagonistic bacteria against y...
Biochemical and molecular characterization of antagonistic bacteria against y...Biochemical and molecular characterization of antagonistic bacteria against y...
Biochemical and molecular characterization of antagonistic bacteria against y...
eSAT Publishing House
 
Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...
eSAT Publishing House
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digital
eSAT Publishing House
 
Dsp based implementation of field oriented control of
Dsp based implementation of field oriented control ofDsp based implementation of field oriented control of
Dsp based implementation of field oriented control of
eSAT Publishing House
 
Pedestrian priority in urban area and usefulness
Pedestrian priority in urban area and usefulnessPedestrian priority in urban area and usefulness
Pedestrian priority in urban area and usefulness
eSAT Publishing House
 
Color measurements of electroplated gold film on
Color measurements of electroplated gold film onColor measurements of electroplated gold film on
Color measurements of electroplated gold film on
eSAT Publishing House
 
Domestic roof top rainwater harvesting a case study
Domestic roof top rainwater harvesting   a case studyDomestic roof top rainwater harvesting   a case study
Domestic roof top rainwater harvesting a case study
eSAT Publishing House
 
Software security risk mitigation using object
Software security risk mitigation using objectSoftware security risk mitigation using object
Software security risk mitigation using object
eSAT Publishing House
 
An axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofAn axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of of
eSAT Publishing House
 
Effect of chemical treatments on the characteristics of regular and compact c...
Effect of chemical treatments on the characteristics of regular and compact c...Effect of chemical treatments on the characteristics of regular and compact c...
Effect of chemical treatments on the characteristics of regular and compact c...
eSAT Publishing House
 
Importance of post processing for improved binarization of text documents
Importance of post processing for improved binarization of text documentsImportance of post processing for improved binarization of text documents
Importance of post processing for improved binarization of text documents
eSAT Publishing House
 
An extended database reverse engineering – a key for database forensic invest...
An extended database reverse engineering – a key for database forensic invest...An extended database reverse engineering – a key for database forensic invest...
An extended database reverse engineering – a key for database forensic invest...
eSAT Publishing House
 
Soft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteSoft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial waste
eSAT Publishing House
 

Viewers also liked (20)

Building extraction from remote sensing imageries by data fusion techniques
Building extraction from remote sensing imageries by data fusion techniquesBuilding extraction from remote sensing imageries by data fusion techniques
Building extraction from remote sensing imageries by data fusion techniques
 
An image crawler for content based image retrieval
An image crawler for content based image retrievalAn image crawler for content based image retrieval
An image crawler for content based image retrieval
 
Feasibility study of concrete based pavement by using fibers & cementing wast...
Feasibility study of concrete based pavement by using fibers & cementing wast...Feasibility study of concrete based pavement by using fibers & cementing wast...
Feasibility study of concrete based pavement by using fibers & cementing wast...
 
Optimization of physical parameters of α amylase
Optimization of physical parameters of α amylaseOptimization of physical parameters of α amylase
Optimization of physical parameters of α amylase
 
Construction of sine and cosine hologram of brain tumor image
Construction of sine and cosine hologram of brain tumor imageConstruction of sine and cosine hologram of brain tumor image
Construction of sine and cosine hologram of brain tumor image
 
Low complexity video coding for sensor network
Low complexity video coding for sensor networkLow complexity video coding for sensor network
Low complexity video coding for sensor network
 
Degradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution usingDegradation of mono azo dye in aqueous solution using
Degradation of mono azo dye in aqueous solution using
 
Biochemical and molecular characterization of antagonistic bacteria against y...
Biochemical and molecular characterization of antagonistic bacteria against y...Biochemical and molecular characterization of antagonistic bacteria against y...
Biochemical and molecular characterization of antagonistic bacteria against y...
 
Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digital
 
Dsp based implementation of field oriented control of
Dsp based implementation of field oriented control ofDsp based implementation of field oriented control of
Dsp based implementation of field oriented control of
 
Pedestrian priority in urban area and usefulness
Pedestrian priority in urban area and usefulnessPedestrian priority in urban area and usefulness
Pedestrian priority in urban area and usefulness
 
Color measurements of electroplated gold film on
Color measurements of electroplated gold film onColor measurements of electroplated gold film on
Color measurements of electroplated gold film on
 
Domestic roof top rainwater harvesting a case study
Domestic roof top rainwater harvesting   a case studyDomestic roof top rainwater harvesting   a case study
Domestic roof top rainwater harvesting a case study
 
Software security risk mitigation using object
Software security risk mitigation using objectSoftware security risk mitigation using object
Software security risk mitigation using object
 
An axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofAn axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of of
 
Effect of chemical treatments on the characteristics of regular and compact c...
Effect of chemical treatments on the characteristics of regular and compact c...Effect of chemical treatments on the characteristics of regular and compact c...
Effect of chemical treatments on the characteristics of regular and compact c...
 
Importance of post processing for improved binarization of text documents
Importance of post processing for improved binarization of text documentsImportance of post processing for improved binarization of text documents
Importance of post processing for improved binarization of text documents
 
An extended database reverse engineering – a key for database forensic invest...
An extended database reverse engineering – a key for database forensic invest...An extended database reverse engineering – a key for database forensic invest...
An extended database reverse engineering – a key for database forensic invest...
 
Soft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial wasteSoft subgrade stabilization with quarry dust an industrial waste
Soft subgrade stabilization with quarry dust an industrial waste
 

Similar to Securing voip communications in an open network

Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
 
Hiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissionHiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmission
eSAT Journals
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
eSAT Publishing House
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
eSAT Publishing House
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
cscpconf
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
Editor IJMTER
 
50120140507012
5012014050701250120140507012
50120140507012
IAEME Publication
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
IAEME Publication
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
IAEME Publication
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
IAEME Publication
 
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
IRJET Journal
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
Editor Jacotech
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
ijfcstjournal
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
idescitation
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
IJCI JOURNAL
 

Similar to Securing voip communications in an open network (20)

Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Hiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissionHiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmission
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
 
50120140507012
5012014050701250120140507012
50120140507012
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 

Recently uploaded (20)

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 

Securing voip communications in an open network

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 6 SECURING VOIP COMMUNICATIONS IN AN OPEN NETWORK Mukund Sarma1 1Dept. of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Amrita School of Engineering, Amritanagar, Coimbatore, India, 641112. Abstract Channeling voice calls over IP networks has brought many advantages to enterprise communications, but it also creates some security risks. In this paper a technique to enhance the security of vocal and text communication is proposed. This technique is a combination of multipath routing and secret sharing scheme. Information is conveyed securely from one person to another over an open network using the secret sharing scheme. The original data is divided into two shares and each of these shares is sent over the open network through multiple different paths using the multipath routing technique. In case of a man-in-the-middle attack the person will not obtain any information of the original form with only one of the shares. Only if the person collects both the shares he/she can reconstruct the original information. A mechanism to secure SIP (Session Initiation Protocol) and text communication is also discussed in this paper. Keywords: VoIP, Secret sharing scheme, Multipath routing, Speech compression, RTP, TLS, SIP. ---------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION In the early days of VoIP, there was no big concern about security issues related to its use. People were mostly concerned with its cost, functionality and reliability. Now that VoIP is gaining wide acceptance and becoming one of the mainstream communication technologies, security has become a major issue. .There are many security concerns in VoIP such as denial of service, alternation of voice stream, eavesdropping, redirection of call, data manipulation, caller ID imitation and man in the middle attacks.[1][2] To understand these concerns and know how handle them, the architecture of VoIP needs to be understood clearly. In the public switched telephone networks (PSTN) the entire communication paths were administered by officials. So the risk of man-in-the- middle attack is not as high as in the case of VoIP which has multiple intermediate exits between the two users. As a developer, to understand what the security risks in VoIP are, he/she needs to understand the architecture and working of VoIP. Figure 1 depicts the software architecture of VoIP. This architecture is similar to that of Linphone’s software architecture. [15] Fig 1 Software architecture of VoIP Working of VoIP: The caller starts to speak once a call has been set up between two, or more, VoIP devices. At this point the voice signal is converted into a digital signal, formatted for transmission and sent along the network to the destination, where all of the preceding steps have to be reversed.[3] Figure 2 describes the architecture diagram of how VoIP works.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 7 Steps: 1. First the ADC converts analog voice to digital signals (bits) 2. Now the bits are compressed in a format which is best for transmission 3. The payload (voice packets) are inserted in data packets using a real-time protocol (typically RTP over UDP over IP) 4. A signaling protocol is needed to call users: SIP (Session-initiation protocol) does that. 5. At the other end packets are disassembled, data is extracted and then they converted to analog voice signals and sent to the phone. 6. Quality of Service (QoS) makes sure all this happens in the real time as one cannot wait for too long for a reply. Fig 2 Working of VoIP While circuit switching keeps the connection open and constant, packet switching opens a brief connection long enough to send a packet, from one system to another. The sending device (computer/phone) opens a port/channel and sends the packet. . The risk of man-in-the-middle attack is high in the case of VoIP which has multiple intermediate exits between the two users. Man-in-the-middle attacks, eavesdropping and data manipulation can happen as voice traffic travels over the Internet. It is relatively easy for someone to eavesdrop on the media stream and obtain data. In order to prevent eavesdropping, a set of security protocols, called IPsec, is used to apply encryption to the digitized voice stream for VoIP. But this again involves key exchange and is vulnerable to man-in-the- middle attacks. Caller ID manipulation, redirection of a call, hijacking the session by registering happens when an attacker postures as a valid VoIP user and then hack into the system. Hijacking is possible because the signaling messages that the SIP sends as plain text with no guarantee that the data that is received at the receivers end is indeed the data sent by the user. 2. SECURING VOICE CALLS IN THE PROPOSED METHOD Voice is first converted from analog to digital (bits) using an ADC (Analog to Digital Converter). The steps involved in digitizing voice include sampling, quantizing, silent suppression and compression. Since it is a vocal call, even if there is a small loss in data it won’t affect the conversation. So a lossy compression minimizes the amount of data that needs to be transmitted. Codecs such as opus, SILK, speex, PCMU, iSAC etc. can be used for compression of data. [4][5] The SIP server chooses which type of codec is to be used for the call. The compressed data is cut into a constant size of 256 bits. This 256 bit alphanumeric string is then divided into two equal strings. These two 128 bit strings are converted into images. Visual cryptography is applied on these two images and these are now called shares. These shares are then sent on the open network using the concept of multipath routing. At the other end these shares are joined together and decrypted to get the message back in its original form. The use of visual sharing scheme eliminates the risk of eavesdropping. Another advantage of using the shares is that it does not require any key exchange. Since both the shares are sent on two random ports, even if there is a man-in-the-middle-attack he will not be able to modify the data. Figure 3 describes the working of the proposed method. [6] Fig 3 Working of the proposed method SH1 and SH2 are shares 1, 2 respectively.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 8 Working of Shamir’s Visual Sharing Scheme: Visual secret sharing schemes (VSS) represents the particular case of secret sharing scheme where the shares are images. Naor and Shamir were the first to introduce them as a part of visual cryptography [7] [8] [9]. Each image (share) is considered to be a matrix of pixels. By convention, in black-and- white representation, a white pixel is represented by 0 and a black pixel is represented by 1. Example of Naor-Shamir VSS for two participants or two devices Corresponding shares in Shamir’s VSS with 2 participants in the pixel notation are shown in Table 1. [10] Table 1 All possible shares in Shamir’s VSS with 2 participants Figure 4 shows how the digitized 512 bit number is converted to shares and how the two shares are overlapped to get back the original data. Fig 4 Shares of a 512 bit digitized string Multipath Routing: Multipath routing is a technique that allows data to be sent over multiple alternate paths. This is in contrast to a single routing protocol, where a data stream is directed along a single path from a sourceto a destination. With multiple paths, the source and destination pair can use any number of alternate routes to achieve performance enhancements, connection stability, and potential security improvements. Unlike single-path algorithms, these multipath algorithms permit traffic multiplexing over multiple lines. The data (share) is secure when communications are distributed across multiple paths. Here, instead of an intruder observing a common route, as in the case of single path routing, the data is spread out among alternate routes. This makes it difficult for an attacker to determine all the possible routes for a communication and thereby limit his/her interception of the data to a very small volume if one of the routes is being observed. Several methods have been studied in finding out disjoint paths. The concept of disjoint multipath routing is used to send packets for a particular session. [11] [12]
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 9 3. SECURING TEXT COMMUNICATIONS IN THE PROPOSED METHOD VoIP applications make use of SIMPLE (Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions) an instant messaging and presence protocol suite based on Session Initiation Protocol (SIP). SIP is a signaling protocol, used for controlling multimedia communication sessions such as voice and video calls over the Internet. The protocol governs establishment, termination and other essential elements of a call. Messages sent are in the form of Plain text. Any intruder will be able to find out the user name, password and the data. The authentication (The users identity), Integrity (Is the message received the same as the one sent?), privacy and confidentiality (Is someone listening to the conversation?) are at stake. [13] One way to go about securing SIP is using TLS (Transport Layer Security) in SIP [14]. The other way is to encrypt the messages being sent and received to and from the SIP server. An application is developed at the server side that decrypts the encrypted messages that are being sent from the VoIP devices. If the SIP is not secured, there is a risk of attackers making unauthorized calls and gaining access to the VoIP network. This could lead to the access of private conversations made on the VoIP network thereby modifying the messages if needed or bringing down the entire VoIP network. [13] TLS provides an encrypted channel that can be used to send SIP messages. A public key cryptography algorithm is used to encrypt the messages. 4. SUMMARY The proposed method aims to reduce the security risks involved in VoIP communication. Security risks involving voice communication is reduced using the concept of visual cryptography and multipath routing technique. The Shamir’s visual sharing scheme has been implemented to achieve the secret sharing scheme. The shares generated are then sent over the network using the concept of disjoint multipath routing. The paper also proposes two methods on how to secure text communications in VoIP. The proposed method ensures the security concerns in VoIP such as denial of service, alternation of voice stream, eavesdropping, redirection of call, data manipulation, caller ID imitation and man in the middle attacks are not compromised. ACKNOWLEDGMENTS I am highly indebted to Amrita Vishwa Vidyapeetham for their kind co-operation and encouragement which help me in doing this project. I also wish to express sincere gratitude to ADRIN, Department of Space, Government of India for providing me necessary guidance and support required to work on this project. REFERENCES [1]. Hung P.C.K., Martin M.V. 2006.”Security Issues in VOIP Applications” Electrical and Computer Engineering Conference (CCECE).ISBN:1-4244-0038-4. pp: 2361-2364. DOI:10.1109/CCECE2006.2777789 [2]. D. Butcher, X. Li, and J. Guo, 2007. Security Challenge and Defense in VoIP Infrastructures, IEEE Trans.Systems, Man, and Cybernetics Part C: Applications and Reviews, vol. 37, no. 6, pp. 1152–1162 [3]. Khaled Salah, “On the Deployment of VoIP in Ethernet Networks: Methodology and Case Study”, Department of Information and Computer Science, King Fahd University of Petroleum and Minerals. http://faculty.kfupm.edu.sa/ics/salah/voiptool/papers/ComComm.pdf [4]. Malik Ahsan Ali, Imran Rashid, Adnan Ahmed Khan, 2013. “Selection of VoIP CODECs for Different Networks based on QoS Analysis”. International Journal of Computer Applications (IJCA), Vol 84 Issue 5, DOI: 10.5120/14575- 2702 [5]. Leigh A. Thorpe, 1999. “Subjective evaluation of speech compression codecs and other non-linear voice-path devices for telephony applications”, International Journal of Speech Technology. vol. 2, pp: 273-288. DOI: 10.1007/BF02108644 [6]. Ryouichi Nishimura, Shun-ichiro Abe, Norihiro Fujita and Yoiti Suzuki, Nobuyuki Enomoto, Tsutomu Kitamura and Atsushi Iwata, 2010 “Reinforcement of VoIP Security with Multipath Routing and Secret Sharing Scheme “Journal of Information Hiding and Multimedia Signal Processing. ISSN 2073-4212. Ubiquitous International Volume 1, Number 3, pp: 204-219. [7]. Moni Naor, Adi Shamir, 1995. “Visual Cryptography”, Advanced in Cryptology – EUROCRYPT’94, LNCS950. Springer-Verlag. pp: 1-12. [8]. C. Blundo, S. Cimato, and A. De Santis, 2006. “Visual Cryptography Schemes with Optimal Pixel Expansion”, Theoretical Computer Science, vol 369, pp: 169– 182. [9]. C. Blundo, A. De Santis, D.R. Stinson, 1999. “On the contrast in visual cryptography schemes”, J. Cryptology, vol 12, pp: 261–289. [10]. Ruxandra Olimid, “Python Implementation of Visual Secret Sharing Schemes”, Journal of Information Systems & Operations Management, Vol.5.2.1. [11]. S.-J. Lee and M. Gerla, 2001. “Split Multipath Routing with Maximally Disjoint Paths in Ad hoc Networks”, Proc. of Int. Conf. on Communications, vol. 10, pp: 3201-3205. [12]. W. Lou and Y. Fang, 2001. “A Multipath Routing Approach for Secure Data Delivery”, Proc. of Military Communications Conference (MILCOM), vol. 2, pp: 1467– 1473
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 10 [13]. Salsano S, Veltri L, Papalilo D, 2002. “SIP security issues: the SIP authentication procedure and its processing load” Network, IEEE, Vol 16, issue 6, pp: 38-44, DOI: 10.1109/MNET.2002.1081764 [14]. Tadashi Kaji, Kazuyoshi Hoshino, Takahiro Fujishiro, Osamu Takata, Akifumi Yato, Keisuke Takeuchi, Satoru Tezuka, 2006. .” TLS handshake method based on SIP”, Proceedings of the International Multiconference on Computer Science and Information Technology, pp: 467 – 475 [15]. Software Architecture (2014) Available at: http://www.linphone.org/eng/documentation/dev/ (Accessed: 8 Febuary 2014)