• Title/Summary/Keyword: VoIP Service

Search Result 364, Processing Time 0.02 seconds

A Study on Spam Protection Technolgy for Secure VoIP Service in Broadband convergence Network Environment (BcN 환경에서 안전한 VoIP 서비스를 위한 스팸대응 기술 연구)

  • Sung, Kyung;Kim, Seok-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.670-676
    • /
    • 2008
  • There is a difficult plane letting a security threat to occur in Internet networks as VoIP service uses technology-based the Internet is inherent, and you protect without adjustment of the existing security solution or changes with real-time service characteristics. It is a voice to single networks The occurrence security threat that it is possible is inherent in IP networks that effort and cost to protect a data network only are complicated relatively as provide service integrated data. This paper about various response way fields to be able to prevent analysis regarding definition regarding VoIP spam and VoIP spam technology and VoIP spam.

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.

Design of User Access Authentication and Authorization System for VoIP Service (사용자 접근권한 인증을 이용한 안전한 VoIP 시스템 설계)

  • Yang, Ho-Kyung;Kim, Jin-Mook;Ryou, Hwang-Bin;Park, Choon-Sik
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.41-49
    • /
    • 2008
  • VoIP is a service that changes the analogue audio signal into a digital signal and then transfers the audio information to the users after configuring it as a packet; and it has an advantage of lower price than the existing voice call service and better extensibility. However, VoIP service has a system structure that, compared to the existing PSTN (Public Switched Telephone Network), has poor call quality and is vulnerable in the security aspect. To make up these problems, TLS service was introduced to enhance the security. In practical system, however, since QoS problem occurs, it is necessary to develop the VoIP security system that can satisfy QoS at the same time in the security aspect. In this paper, a user authentication VoIP system that can provide a service according to the security and the user through providing a differential service according to the approach of the users by adding AA server at the step of configuring the existing VoIP session is suggested. It was found that the proposed system of this study provides a quicker QoS than the TLS-added system at a similar level of security. Also, it is able to provide a variety of additional services by the different users.

  • PDF

The Numbering System for VoIP Sevices (VoIP 서비스의 번호체계)

  • 원동유;신승수;조용환
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.1
    • /
    • pp.98-103
    • /
    • 2002
  • Currently, VoIP service related companies have different telephone number system according to the problem of VoIP which Have no unique number system, and they develop/use different number bits, shortening button, and so on. In this paper, for solving this problem, we analyzed the standadization trend of ITU-T and IEIE, and reserched domestic trend of VoIP number system standardization trend and use case of number system of VoIP services. According to this, we proposes three number allocation plan that satisfies the globe trend, simpleness of number allocation, and VoIP service provider's actual conditions.

  • PDF

Policy and Managerial Issues of Voice over Internet Protocol(VoIP) (인터넷전화의 정책 및 경영이슈측면에서의 이용자분석)

  • Kim, Ji-Hee;Sung, Yoon-Young;Kweon, O-Sang;Kim, Jin-Ki
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.4
    • /
    • pp.221-233
    • /
    • 2007
  • Which factors should influence consumer consideration to subscribe to Voice over Internet Protocol (VoIP)? Policy issues, managerial concerns, and demographic variables are possible factors. This paper discusses policy and managerial issues regarding VoIP adoption. A model that explains VoIP adoption is proposed and tested. This study analyzes a survey of 750 prospective VoIP users in Korea. The testing is accompanied by logistic regression and discriminant analysis. The results show that trust in VoIP, relative comparison of Quality to fixed service, numbering plan, satisfactions of call Quality and customer services on both fixed and mobile services have impacts on the adoption of VoIP. Implications for VoIP providers and policy makers are presented.

  • PDF

An Analysis and modeling of Mobile IP network in VoIP Network (VoIP Network에서 Mobile IP 분석 및 설계)

  • Eom, Ki-Bok;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.414-418
    • /
    • 2003
  • VoIP is a core technology used to transmit both voice and data in an integrated packet' form. Within this technology, SIP is the signaling protocol used for 'real time' call services; particularly those where H323 is used. Yet, when considering the needs of mobile users, it is essential we integrate VoIp within the mobile technology so the mobile host is able to receive the 'packet' transported and by, and connected to, any available internet-address. For all this to occur, we need to improve Network Delay by reducing transmission problems associated with mobile services. If we are to obtain an optimal service then we must reduce any network delays which may arise from joining Mobile IP and VoIp services. This paper, therefore, considers how, unlike previous research, these delays may be improved through the use of the signaling technology\ulcorner SIP. It also considers how this research may be introduced into current wired and wireless integrated services enabling them to use the IP 'packet'.

  • PDF

A Study of VoIP Encryption and Authentication Technologies in 4G WiBro Services (4G WiBro서비스에서 VoIP 암호화와 인증기술 연구)

  • Baek, Jong-Il;Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.291-294
    • /
    • 2011
  • 4G WiBro service in Korea, the world's fourth-generation communication is standardized. VoIP service has been activated one of the application in WiBro communications infrastructure. When using VoIP in the WiBro service, complementing the existing VoIP vulnerabilities in the encryption and authentication technology is a need for research. In this paper, fourth-generation WiBro, LTE, and the definition, 1G, 2G, 3G and 4G compares. And, WiBro service in the VoIP edaehan technical, administrative, physical, and hacker attacks and vulnerability analysis is the study of security measures. Enhanced security measures for the WiBro service to VoIP security through encryption and authentication technologies are studied.

  • PDF

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

A Study of Eavesdropping and Attack about Smart Phone VoIP Services (Smart Phone VoIP 서비스에 대한 공격과 도청 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Yang, Jong-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1313-1319
    • /
    • 2011
  • VoIP service by taking advantage of the current PSTN network and internet over the existing telephone network at an affordable price allows you to make voice calls to the service is being expanded. However, the security of public must be maintained for security vulnerabilities in Smart Phone VoIP case problems arise, and is likely to be attacked by hackers. In this paper, the Internet, using wired and Smart Phone VoIP services may occur during analysis of the type of incident and vulnerability analysis, the eavesdropping should conduct an attack. Smart Phone VoIP with institutional administration to analyze the vulnerability OmniPeek, AirPcap the equipment is installed in a lab environment to conduct eavesdropping attack. Packet according to the analysis and eavesdropping attacks, IP confirmed that the incident as an attack by the eavesdropping as to become the test proves. In this paper, as well as Smart Phone VoIP users, the current administration and the introduction of Smart Phone service and VoIP service as a basis for enhanced security will be provided.

Industry Activation Scheme through mVoIP Technology Trends and Market Analysis

  • Park, Se-Hwan;Park, Jong-Kyu;Kim, Cheong-Ghil
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.59-63
    • /
    • 2012
  • The mVoIP service is the technology which focuses on the wireless data service as the IP network having the transmission rate of 100 Mbps classes on the high-speed middle of movement through the WiFi, WiBro and 3G mobile radio communication network, and etc. and is developed. Since 2010, the mVoIP (mobile VoIP) service shows the rapid growth due to 4G-LTE service seriously disclosed from July with the Smart phone and 2,011 it begins to be rapidly popularized. In this research, additionally the mVoIP service industry activation plan is presented with the trends of technology development including the chip-set/module/terminal, etc. based upon local and foreign market trend searchlight through the market demand analysis. The mVoIP service downloads App to the mobile apparatus and or can provide the service as the software through the WiFi network. Therefore, the change which is large in the products development aspect is to be have no. Expected to is being provided as the added service in the case of 4G-LTE as a matter of course, the service deployment where it is based on the market principle and demand needs is needed.