Security on VoIP

Abstract

Voice over Internet protocol (VoIP), is a way of communicating over Internet. It is one of the newest technology. There is an existing way of communication over any network. The Users can make the telephone calls over an IP network using this technology. This paper will describe Voice over Internet Protocol (VoIP) to a level that allows discussion of security issues and concerns. There are two kinds of spoofing attacks are possible, first one is IP spoofing attack and another is URI spoofing attack, which are described in this review paper. The Implementation of VoIP concerned by businesses, components of a VoIP system, and relevant security issues. The business concerns will be those which are used to affect the Quality of Service (QoS). The network components call processors, gateways and two of the more common architectures are held by VoIP.

Authors and Affiliations

Deepak Kumar, Deepika, Krishan Sharma

Keywords

Related Articles

Diagnosis of thyroid disorders using Backpropagation method

The diagnosis of thyroid disorders using back propagation algorithm by training feed-forward neural network has been discussed in this paper. The body’s metabolic rate is controlled by thyroid hormones secreted by Thyro...

Wheat Yield Prediction Using Artificial Neural Network and Crop Prediction Techniques (A Survey)

This survey paper represents the forecasting techniques in the field of Agricultural (Wheat crop). Paper shows all the past research development of forecasting in all areas. The major forecasting models are Statistical,...

Reconciling End-To-End Confidentiality and Data Reduction in Cloud Storage

The repeating of data storage is reduced by the implementation of the de-duplication techniques. The wastage of memory storage is affected the storage space. The concept of cloud computing is helpful for data storage. B...

Adaptive P&O MPPT Method Using Zeta Converter for Solar PV Systems

This paper implements an Adaptive Perturb and Observe (P&O) Maximum Power point tracking (MPPT) method using Zeta converter (Dc-Dc converter) for photovoltaic systems. In this proposed method current perturbation is con...

A Comparison the Industrialization and Traditional Systems Using AHP

The extensive and growing need for the construction and housing has raised more than ever the necessity for using building systems and new materials in order to increase the speed of construction, lightweight constructi...

Download PDF file
  • EP ID EP18965
  • DOI -
  • Views 289
  • Downloads 8

How To Cite

Deepak Kumar, Deepika, Krishan Sharma (2014). Security on VoIP. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(10), -. https://europub.co.uk./articles/-A-18965