Security on VoIP

Abstract

Voice over Internet protocol (VoIP), is a way of communicating over Internet. It is one of the newest technology. There is an existing way of communication over any network. The Users can make the telephone calls over an IP network using this technology. This paper will describe Voice over Internet Protocol (VoIP) to a level that allows discussion of security issues and concerns. There are two kinds of spoofing attacks are possible, first one is IP spoofing attack and another is URI spoofing attack, which are described in this review paper. The Implementation of VoIP concerned by businesses, components of a VoIP system, and relevant security issues. The business concerns will be those which are used to affect the Quality of Service (QoS). The network components call processors, gateways and two of the more common architectures are held by VoIP.

Authors and Affiliations

Deepak Kumar, Deepika, Krishan Sharma

Keywords

Related Articles

Under-Water Welding Using Robotic Technology

Welding in offshore and marine application is an area of research and understanding, where many problems are still unsolved. The important application of the off shore welding is the ship building and pipeline construct...

Implementation Issues in Bluetooth Based Smart Sensor Network

In this paper we focus on wireless sensor networks and Bluetooth issues related to its use in sensor networks. An implementation platform for a Bluetooth based sensor network is presented and functionalities are describ...

slugAnalysis of Various Image Steganography Techniques

Steganography is an art and science of hiding the information into some carrier files without changing the visual properties of carrier file. In digital world, the carrier file can be text file, audio/video file, image...

Decision Making to Evaluate Interpersonal Skills Based on Similarity Checking using Artificial Intelligence

In this paper, we proposed a method to solve the problem related to the team formation and influence of the team performance among the students. Group formation could be a key aspect in computer-supported cooperative le...

slugInvestigation of Thermal Boundary Layer of non-Newtonian Fluid Past over a Wedge

This paper investigates the problem of steady, laminar, two-dimensional boundary layer flow and heat transfer of an incompressible, viscous non-Newtonian fluid over a wedge. A non-Newtonian fluid represented by power la...

Download PDF file
  • EP ID EP18965
  • DOI -
  • Views 273
  • Downloads 8

How To Cite

Deepak Kumar, Deepika, Krishan Sharma (2014). Security on VoIP. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(10), -. https://europub.co.uk./articles/-A-18965