VoIPS: VoIP Secure encryption solution
碩士 === 國立臺灣科技大學 === 資訊工程系 === 100 === VoIP was proposed in 1995 and subsequently popularity rate is getting rise based on the promotion on various protocol agreements and relevant internet technologies. The architecture of VoIP is that two endpoints within the same data network that frontend will tr...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2012
|
Online Access: | http://ndltd.ncl.edu.tw/handle/99471034277239213140 |
id |
ndltd-TW-100NTUS5392007 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-100NTUS53920072015-10-13T20:52:01Z http://ndltd.ncl.edu.tw/handle/99471034277239213140 VoIPS: VoIP Secure encryption solution VoIPS: 語音通話安全加密解決方案 Chiung-Yi Wu 吳烱毅 碩士 國立臺灣科技大學 資訊工程系 100 VoIP was proposed in 1995 and subsequently popularity rate is getting rise based on the promotion on various protocol agreements and relevant internet technologies. The architecture of VoIP is that two endpoints within the same data network that frontend will translates analog voice signals into a stream of digitized packets and sends them to recipients over data network. VoIP technologies allow enterprises transfer the voice data through the data network, the key advantages of VoIP are flexibility and ideal cost-effective orientation for individual users and corporations across the world for communication once people have the basis of ubiquitous broadband connectivity that no matter how whereabouts. However, VoIP would definitely encounter the complications which occurred on internet for the same- There are full of a variety of malicious threats are extraordinarily common over the net, and same for its vulnerabilities and weakness on protocol and operating platform. Hence, mentioned aforesaid that conduct the derivative security subjects. According to threat taxonomy which defined by VoIPSA (VoIP Security Alliance) on 2005, we conclude that the significant security issues are based on there is no well-arranged mechanism to address such as eavesdropping, interception and modification or conversation construction even though there has several secure protocol mechanism and compliance standard were released. However, above standards and protocols for voice encryption it brings the additional overheads and bandwidth consumption, also for it can not provide the capability of NAT traversal with satisfy the service availability, all can not meet the commercial market. Hence, in this paper we propose a lightweight algorithm and develop a conceptual hardware platform for evaluation and validation to meet market demand. Hahn-Ming Lee 李漢銘 2012 學位論文 ; thesis 71 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣科技大學 === 資訊工程系 === 100 === VoIP was proposed in 1995 and subsequently popularity rate is getting rise based
on the promotion on various protocol agreements and relevant internet technologies.
The architecture of VoIP is that two endpoints within the same data network that
frontend will translates analog voice signals into a stream of digitized packets and
sends them to recipients over data network. VoIP technologies allow enterprises
transfer the voice data through the data network, the key advantages of VoIP are
flexibility and ideal cost-effective orientation for individual users and corporations
across the world for communication once people have the basis of ubiquitous
broadband connectivity that no matter how whereabouts. However, VoIP would
definitely encounter the complications which occurred on internet for the same-
There are full of a variety of malicious threats are extraordinarily common over the
net, and same for its vulnerabilities and weakness on protocol and operating platform.
Hence, mentioned aforesaid that conduct the derivative security subjects.
According to threat taxonomy which defined by VoIPSA (VoIP Security
Alliance) on 2005, we conclude that the significant security issues are based on there
is no well-arranged mechanism to address such as eavesdropping, interception and
modification or conversation construction even though there has several secure
protocol mechanism and compliance standard were released.
However, above standards and protocols for voice encryption it brings the
additional overheads and bandwidth consumption, also for it can not provide the
capability of NAT traversal with satisfy the service availability, all can not meet the
commercial market.
Hence, in this paper we propose a lightweight algorithm and develop a
conceptual hardware platform for evaluation and validation to meet market demand.
|
author2 |
Hahn-Ming Lee |
author_facet |
Hahn-Ming Lee Chiung-Yi Wu 吳烱毅 |
author |
Chiung-Yi Wu 吳烱毅 |
spellingShingle |
Chiung-Yi Wu 吳烱毅 VoIPS: VoIP Secure encryption solution |
author_sort |
Chiung-Yi Wu |
title |
VoIPS: VoIP Secure encryption solution |
title_short |
VoIPS: VoIP Secure encryption solution |
title_full |
VoIPS: VoIP Secure encryption solution |
title_fullStr |
VoIPS: VoIP Secure encryption solution |
title_full_unstemmed |
VoIPS: VoIP Secure encryption solution |
title_sort |
voips: voip secure encryption solution |
publishDate |
2012 |
url |
http://ndltd.ncl.edu.tw/handle/99471034277239213140 |
work_keys_str_mv |
AT chiungyiwu voipsvoipsecureencryptionsolution AT wújiǒngyì voipsvoipsecureencryptionsolution AT chiungyiwu voipsyǔyīntōnghuàānquánjiāmìjiějuéfāngàn AT wújiǒngyì voipsyǔyīntōnghuàānquánjiāmìjiějuéfāngàn |
_version_ |
1718052897105641472 |