scispace - formally typeset
Open AccessJournal Article

A Framework for Secure VoIP

Mandeep Singh, +1 more
- 01 Jul 2015 - 
- Vol. 2, Iss: 1, pp 184-188
Reads0
Chats0
TLDR
In this security framework authentication is implemented first to authenticate the true user and then cryptography techniques is used to safely transmit the information stream over the network.
Abstract
VoIP stands for Voice over Internet Protocol and is a way to carry voice traffic over computer networks like the Internet. Over the last decade VoIP has become increasingly popular, gaining millions of subscribers every year (e.g. LINE and WECHAT provide voicecall facilities) and has certainly caught the eye of telecommunication service providers all over the world. The driving factor for the success of VoIP is cost reduction, both for users and providers. But VoIP doesn’t only bring reduced costs it also brings threats and vulnerabilities since it is IP based it’s susceptible to large number of threats. The threats include spoofing or identity theft and call redirection, making data integrity a major risk. Therefore authentication and encryption techniques can be used to design a framework which can survive the possible threats. In this security framework authentication is implemented first to authenticate the true user and then cryptography techniques is used to safely transmit the information stream over the network. The authentication part will be implemented using biometrics because it is not possible to theft anyone’s physical features.

read more

References
More filters
Journal ArticleDOI

An introduction to biometric recognition

TL;DR: A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized.
Journal ArticleDOI

Voice over Internet protocol (VoIP)

TL;DR: The factors involved in making a high-quality VoIP call and the engineering tradeoffs that must be made between delay and the efficient use of bandwidth are discussed and various techniques to achieve network quality of service are discussed.
Journal ArticleDOI

Speaker recognition—Identifying people by their voices

TL;DR: A discussion of inherent performance limitations, along with a review of the performance achieved by listening, visual examination of spectrograms, and automatic computer techniques, attempts to provide a perspective with which to evaluate the potential of speaker recognition and productive directions for research into and application of speaker Recognition technology.
Proceedings ArticleDOI

Speaker-centric score normalisation and time pattern analysis for continuous speaker verification

TL;DR: Experiments showed that speaker-centric score normalisation improved performance and standardises the target score distribution to allow the accurate prediction of miss probabilities in a mobile phone environment.