VoIP Security: A Performance and Cost-benefit Analysis
Abstract
Keywords
References
Sudip S. (2015, Jul 05). "VoIP Services Market to Expand at 9.7% CAGR till 2020 Thanks to Increasing Adoption in Residential and Corporate Sectors" [Online]. Available: http://www.transparencymarketresearch.com/pressrelease/voip-services-market.htm
M. Desantis. "Understanding voice over Internet protocol (VoIP)", in US-Cert, 2006. Online: https://www.us-cert.gov/sites/default/files/publications/understanding_voip.pdf
A. B. Johnston, “SIP and the Internet,” in SIP: Understanding the Session Initiation Protocol, 3rd ed. Boston: Artech House, 2009, ch. 1, pp. 1-23.
J. Pollard. (2014, May 8). "VoIP Continues To Replace PSTN" [Online]. Available: http://blog.birch.com/voip-continues-to-replace-pstn
Butcher, D.; Xiangyang Li; Jinhua Guo, "Security Challenge and Defense in VoIP Infrastructures," in Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol.37, no.6, pp.1152-1162, Nov. 2007 doi: 10.1109/TSMCC.2007.905853.
J. Xin, "Security issues and countermeasure for VoIP". Online: https://www.sans.org/reading-room/whitepapers/voip/security-issues- countermeasure-voip-1701.
Sonwane, G.D.; Chandavarkar, B.R., "Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network," in Advanced Computing, Networking and Security (ADCONS), 2013 2nd International Conference on, vol., no., pp.187-192, 15-17 Dec. 2013. doi: 10.1109/ADCONS.2013.30.
Coulibaly, E.; Lian Hao Liu, "Security of Voip networks," in Computer Engineering and Technology (ICCET), 2010 2nd International Conference on, vol.3, no., pp. V3-104-V3-108, 16-18 April 2010. doi: 10.1109/ICCET.2010.5485790.
Perez-Botero, D.; Donoso, Y., "VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures," in Networking and Distributed Computing (ICNDC), 2011 Second International Conference on, vol., no., pp.192-196, 21-24 Sept. 2011. doi:10.1109/ICNDC.2011.46.
L. Shan; N. Jiang, "Research on Security Mechanisms of SIP-Based VoIP System," in Hybrid Intelligent Systems, 2009. HIS '09. Ninth International Conference on, vol.2, no., pp.408-410, 12-14 Aug. 2009 doi: 10.1109/HIS.2009.196.
R. Barbieri et al., “Voice over IPsec: Analysis and Solutions,” in ACSAC, 2002.
H. A. S. Ahmed, N. Sulaiman, and M.N. Mohammed, “Performance Analysis of VoIP Quality of Service in IPv4 and IPv6 environment,” in International Journal of Digital Content Technology and its Applications, vol. 8, no. 2, pp. 40–51, Apr. 2014.
T. G. Rahangdale, P. A. Tijare, and S. N. Sawalkar, “An Overview on Security Analysis of Session Initiation Protocol in VoIP network,” in International Journal of Research in Advent Technology, vol. 2, no. 4, pp. 190–195, Apr. 2014.
T. Hoeher, M. Petraschek, S. Tomic, and M. Hirschbichler, “Evaluating Performance Characteristics of SIP over IPv6,” in Journal of Networks, vol. 2, no.4, pp. 40–50, Aug. 2007.
R. Yasinovskyy, A. L. Wijesinha, and R. Karne, “VoIP performance with IPsec in IPv4-IPv6 transition networks,” 2010, vol. LXV, pp. 15–23.
C. Shen, et al., "The impact of TLS on SIP server performance", in IPTComm, 2010. Online: http://www.cs.columbia.edu/~hgs/papers/Shen1008_TLS.pdf.
M.T. Ashraf, J.N. Davies, V. Grout, "An Investigation into the Effect of Security on Performance in a VoIP Network", Online: http://www.glyndwr.ac.uk/computing/rese arch/pubs/sein_adg.pdf.
M. Kulin, T. Kazaz, S. Mrdovic, "SIP Server Security with TLS: Relative Performance Evaluation". Online: http://www.academia.edu/2570286/SIP_server_security_with_TLS_Relative_performance_evaluation.
A. Alexander et al., "An Evaluation of Secure Real-time Transport Protocol (SRTP) Performance for VoIP", in International Conference on Network and System Security, QLD, 2009, pp. 95-101.
(Jan 2014). Testing Voice over IP (VoIP) Networks (Rev B) Online: Available: https://www.ixiacom.com/sites/default/files/resources/whitepaper/voip-whitepaper.pdf.
A. Critelli. (2014, Jun 22). Hacking VoIP – Decrypting SDES Protected SRTP Phone Calls. [Online]. Available: https://www.acritelli.com/hacking-voip-decrypting-sdes-protected-srtp-phone-calls/.
D. Gedia and L. Perigo, “A centralized network management applicationfor academia and small business networks,” IT in Industry, vol. 6, no. 3, pp. 1-10, Aug. 2018.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.