International Journal of Networks and Communications
p-ISSN: 2168-4936 e-ISSN: 2168-4944
2011; 1(1): 1-5
doi: 10.5923/j.ijnc.20110101.01
K. Maheswari 1, M. Punithavalli 2
1Dept. of Computer Applications, SNR SONS College, Coimbatore, 9487458466, India
2Dept. of Computer Applications, Sri Ramakrishna Engineering College, Coimbatore, India
Correspondence to: K. Maheswari , Dept. of Computer Applications, SNR SONS College, Coimbatore, 9487458466, India.
Email: |
Copyright © 2012 Scientific & Academic Publishing. All Rights Reserved.
A major change in telecommunication industry is Voice over Internet Protocol (VoIP). VoIP offers interactive communications. It differs from conventional circuit switched networks. It allows people to communicate with each other at very low rates. The transmission of Real time voice data is not as easy as ordinary text data. The real time voice transmission faces lot of difficulties. It suffers from packet loss, delay, security and quality. These factors will affect the communication, degrades the performance and quality of a VoIP. This paper addresses the security aspects of VoIP to improve the quality.
Keywords: Security, Quality, Telecommunication and VoIP
Cite this paper: K. Maheswari , M. Punithavalli , "An Assessment of Security in Voip Using Secret Sharing", International Journal of Networks and Communications, Vol. 1 No. 1, 2011, pp. 1-5. doi: 10.5923/j.ijnc.20110101.01.
Figure 1. Secret Sharing. |
[1] | Berry Schoenmakers,” A simple publicly verifiable secret sharing scheme and its application to electronic voting”, CRYPTO 99 vol 1666 of lecture notes in computer science ,springer-verlag,1999,pp: 148-164 |
[2] | Chung-Hsin Liu,Chun-lin Lo,”The simulation for the SIP DDoS attack”,2009 Fifth international IEEE conference on INC, IMS and IDC |
[3] | Dannan Lin, Charles A. shoniregun,Galyna A.Akmayeva,”The softphone security”,2008,IEEE international conference |
[4] | Eric Y.Chen, Mistutaka Itoh,” A whitelist approach to protect SIP servers from flooding attacks”, IEEE conference, 2010 |
[5] | Gauravkumar raval,Amitava pal,”VoIprotect: A layered security Architecture”,Tenth IEEE international symposium on Multimedia,2008 |
[6] | Hugo Krawczyk,”secret sharing made short”, 1998, Springer-verlag |
[7] | Hui Tian ,Ke Zhou,Hong Jiang,Jin Liu,Yongfeng Huang, Dan Feng,”An M-sequence based steganography model for voice over IP”, publication in the IEEE ICC 2009 proceedings |
[8] | JoongMan Kim, SeokUng Yoon,Hyuncheol Jeong, Yoojae Won,”implementation and evaluation of SIP based secure VoIP communication system”,2008,IEEE/IFIP international conference on embedded and ubiquitous computing |
[9] | Rafael Mendes Pereira and Liane margarida Rockenbach Tarouco,”adaptive multiplexing based on E-Model for reducing network overhead in voice over IP security ensuring conversation quality”,2009 fourth international conference on digital telecommunications |
[10] | Rainer Falk,Steffen Fries, Hans Joachim Hof ,2010 third international conference on advances in human oriented and personalized mechanisms , Technologies and services |
[11] | Ryouichi Nishimura,Shun-ichiro Abe,Norihiro Fujita and Yoiti Suzuki,” Reinforcement of VoIP security with multipath routing and secret sharing scheme”,Jouranl of information hiding and multimedia signal processing,2010,Vol 1,number 3, July 2010,ISSn: 2073-4212 |
[12] | William Marshall, Alireza Farid Faryar, Kevin Kealy, Gustav de los Reyes, Israel Rosencrantz,Rachel Rosen crantz and Chaim Spielman,At & T Labs,USA,”Carrier VoIP Security Architecture” |
[13] | Wei Wang,Soung Chang Liew,Victor o.k.Li,”solutions to performance problems in VoIP over a 802.11 wireless LAN”, IEEE transactions on vehicular technology , vol 5, No.1, Jan 2005. |