2010
DOI: 10.1002/dac.1191
|View full text |Cite
|
Sign up to set email alerts
|

VoIP secure session assistance and call monitoring via building security gateway

Abstract: SUMMARYA secure architecture is proposed in the home/office networking environment with a special appliance, called Building Security Gateway (BSG), for cheap SIP devices and unsupported soft user agents (UAs) performing security functions successfully, such as construction of secure sessions and encrypting/decrypting media. Therefore, we apply BSG procedure to VoIP for getting secure session. Furthermore, VoIP call monitoring and intercepting functions are also implemented in BSG. Secure session monitoring is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…There are also other initiatives in monitoring QoS parameters and ensuring the security of VoIP services [26][27][28][29][30][31]. A secure architecture is proposed in [26] for VoIP services to ensure secured sessions and the authors in [27] proposed a QoS algorithm to reduce the average delay time and jitter for VoIP services. Observation on the QoS parameters for VoIP over local area network segment and Internet has been conducted in [28].…”
Section: Related Workmentioning
confidence: 99%
“…There are also other initiatives in monitoring QoS parameters and ensuring the security of VoIP services [26][27][28][29][30][31]. A secure architecture is proposed in [26] for VoIP services to ensure secured sessions and the authors in [27] proposed a QoS algorithm to reduce the average delay time and jitter for VoIP services. Observation on the QoS parameters for VoIP over local area network segment and Internet has been conducted in [28].…”
Section: Related Workmentioning
confidence: 99%
“…SIP is an application layer control protocol for creating, modifying, and terminating multimedia sessions between participants . As a request–response protocol, SIP authentication is inherited from HTTP digest authentication , which makes SIP vulnerable to several types of security threats and attacks such as impersonation, eavesdropping, message modification, and so on. An authentication key agreement is one of the most crucial technologies for achieving acceptable security level when SIP is used to protect the communications among the users.…”
Section: Introductionmentioning
confidence: 99%
“…The SIP was developed by the Internet Engineering Task Force [23] in 1996. SIP is an application layer signaling protocol for creating, modifying, and terminating multimedia sessions among one or more participants (e.g., [24][25][26][27][28][29][30]). Various authentication schemes especially using password have been proposed to provide security for SIP (e.g., [31][32][33][34][35][36][37][38][39][40][41][42][43]).…”
Section: Introductionmentioning
confidence: 99%