IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 11    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 11,November 2012
A Secured Voice over Internet Protocol (VoIP) Setup Using MiniSipServer
Full Text(PDF, )  PP.1086-1093  
Ogundile O.O, Lawal B.H and Osanaiye O.A
Networks, VoIP Setup and calls, VoIP Security, Virtual Private Network, VoIP as an alternative to PSTN
What an alternative. Most people argue that if something works well there is no sense in changing it. This is exactly what is happening with VoIP today. Voice over Internet Protocol usually called VoIP is the transmission of voice, video conferencing, dat
[1] S. Ansari and A. Khan (2007), ‘Voice over Internet Protocol Security problems in wireless Environment,’ Journal of Engineering and Science, 1(2), pp. 82-85.

[2] M. Ranganathan and L. Kilimartin (2003), ‘Performance analysis of secure session initiation protocol based VoIP networks,’ Computer Communications 26(6), pp.552-565.

[3] E. Amoroso (1994), ‘A book introducing critical issues in computer security technology,’ Fundamentals of Computer Security Technology, Bell Laboratories.

[4] R. Dhamankar (2005), ‘Intrusion Prevention: The Future of VoIP Security,’ White paper by Tripping Point.

[5] Ramachandran (2006), VoIP Security: asserting the trust boundary, ‘The Global Voice of Information Security,’ ISSA Journal pp.8-13.

[6] M. Desantis (2008), ‘Understanding Voice over Internet Protocol (VoIP),’ US-CER.

[7] S. Karapantazis and F. Pavlidou (2009), ‘VoIP: A comprehensive survey on promising technology, ’Computer Networks, 53(12), pp.2050-2090.

[8] D. Geneiatakis, C. Lambrinoudakis and G. Kambourakis (2007), ‘An ontology - based policy for deploying secure SIP-based VoIP services,’ Computer & Security, 2006(27), pp.285-297.

[9] E. Fernandez, J. Palaez, and M. Larrondo-Petrie (2007), ‘Security Patterns for Voice over IP Networks,’ Journals of Software, 2(2), pp. 19-29.

[10] D. Ramirez (2007), ‘Security within VoIP networks,’ Information Systems Control Journal, Vol 6.

[11] Cisco Networkers 2000, http://www.cisco.com/networkers/nw00/pres/2403. pdf Accessed date 21st of September, 2012.

[12] Microsoft Windows Server 2003 White Paper.

[13] Kent, S. Atkinson, R. (November 1998). IP Encapsulating Security Payload (ESP). IETF. RFC 2406. Accessed date 21st of September, 2012.

Untitled Page