VoIPS: VoIP Secure encryption solution

碩士 === 國立臺灣科技大學 === 資訊工程系 === 100 === VoIP was proposed in 1995 and subsequently popularity rate is getting rise based on the promotion on various protocol agreements and relevant internet technologies. The architecture of VoIP is that two endpoints within the same data network that frontend will tr...

Full description

Bibliographic Details
Main Authors: Chiung-Yi Wu, 吳烱毅
Other Authors: Hahn-Ming Lee
Format: Others
Language:en_US
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/99471034277239213140
id ndltd-TW-100NTUS5392007
record_format oai_dc
spelling ndltd-TW-100NTUS53920072015-10-13T20:52:01Z http://ndltd.ncl.edu.tw/handle/99471034277239213140 VoIPS: VoIP Secure encryption solution VoIPS: 語音通話安全加密解決方案 Chiung-Yi Wu 吳烱毅 碩士 國立臺灣科技大學 資訊工程系 100 VoIP was proposed in 1995 and subsequently popularity rate is getting rise based on the promotion on various protocol agreements and relevant internet technologies. The architecture of VoIP is that two endpoints within the same data network that frontend will translates analog voice signals into a stream of digitized packets and sends them to recipients over data network. VoIP technologies allow enterprises transfer the voice data through the data network, the key advantages of VoIP are flexibility and ideal cost-effective orientation for individual users and corporations across the world for communication once people have the basis of ubiquitous broadband connectivity that no matter how whereabouts. However, VoIP would definitely encounter the complications which occurred on internet for the same- There are full of a variety of malicious threats are extraordinarily common over the net, and same for its vulnerabilities and weakness on protocol and operating platform. Hence, mentioned aforesaid that conduct the derivative security subjects. According to threat taxonomy which defined by VoIPSA (VoIP Security Alliance) on 2005, we conclude that the significant security issues are based on there is no well-arranged mechanism to address such as eavesdropping, interception and modification or conversation construction even though there has several secure protocol mechanism and compliance standard were released. However, above standards and protocols for voice encryption it brings the additional overheads and bandwidth consumption, also for it can not provide the capability of NAT traversal with satisfy the service availability, all can not meet the commercial market. Hence, in this paper we propose a lightweight algorithm and develop a conceptual hardware platform for evaluation and validation to meet market demand. Hahn-Ming Lee 李漢銘 2012 學位論文 ; thesis 71 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立臺灣科技大學 === 資訊工程系 === 100 === VoIP was proposed in 1995 and subsequently popularity rate is getting rise based on the promotion on various protocol agreements and relevant internet technologies. The architecture of VoIP is that two endpoints within the same data network that frontend will translates analog voice signals into a stream of digitized packets and sends them to recipients over data network. VoIP technologies allow enterprises transfer the voice data through the data network, the key advantages of VoIP are flexibility and ideal cost-effective orientation for individual users and corporations across the world for communication once people have the basis of ubiquitous broadband connectivity that no matter how whereabouts. However, VoIP would definitely encounter the complications which occurred on internet for the same- There are full of a variety of malicious threats are extraordinarily common over the net, and same for its vulnerabilities and weakness on protocol and operating platform. Hence, mentioned aforesaid that conduct the derivative security subjects. According to threat taxonomy which defined by VoIPSA (VoIP Security Alliance) on 2005, we conclude that the significant security issues are based on there is no well-arranged mechanism to address such as eavesdropping, interception and modification or conversation construction even though there has several secure protocol mechanism and compliance standard were released. However, above standards and protocols for voice encryption it brings the additional overheads and bandwidth consumption, also for it can not provide the capability of NAT traversal with satisfy the service availability, all can not meet the commercial market. Hence, in this paper we propose a lightweight algorithm and develop a conceptual hardware platform for evaluation and validation to meet market demand.
author2 Hahn-Ming Lee
author_facet Hahn-Ming Lee
Chiung-Yi Wu
吳烱毅
author Chiung-Yi Wu
吳烱毅
spellingShingle Chiung-Yi Wu
吳烱毅
VoIPS: VoIP Secure encryption solution
author_sort Chiung-Yi Wu
title VoIPS: VoIP Secure encryption solution
title_short VoIPS: VoIP Secure encryption solution
title_full VoIPS: VoIP Secure encryption solution
title_fullStr VoIPS: VoIP Secure encryption solution
title_full_unstemmed VoIPS: VoIP Secure encryption solution
title_sort voips: voip secure encryption solution
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/99471034277239213140
work_keys_str_mv AT chiungyiwu voipsvoipsecureencryptionsolution
AT wújiǒngyì voipsvoipsecureencryptionsolution
AT chiungyiwu voipsyǔyīntōnghuàānquánjiāmìjiějuéfāngàn
AT wújiǒngyì voipsyǔyīntōnghuàānquánjiāmìjiějuéfāngàn
_version_ 1718052897105641472