Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS
Abstract
References
Index Terms
- Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS
Recommendations
Critical analysis and new perspective for securing voice networks
ICN'05: Proceedings of the 4th international conference on Networking - Volume Part IIVoice networks evolved from the traditional telephone system, to mobile and wireless networks and now towards a converged voice and data infrastructure. This convergence is based on the spread of the Internet Protocol, where VoIP is developing. Due to ...
An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP
NSS '09: Proceedings of the 2009 Third International Conference on Network and System SecurityThe Secure Real-Time Transport Protocol (SRTP) is an Internet standards-track security profile for RTP used to provide confidentiality, integrity and replay protection for RTP traffic. We study the performance of SRTP when it is used to secure VoIP ...
Challenges in Securing Voice over IP
Although VoIP offers lower cost and greater flexibility, it can also introduce significant risks and vulnerabilities. This article explains the challenges of VoIP security and outlines steps for helping to secure an organization's VoIP network.
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/3249efde-f32b-4dcc-a649-89788614aeb5/1529282.cover.jpg)
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigapp
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 254Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in