VOIP End-To-End Security using S/MIME and a Security Toolbox

Article ID

CSTNWSJM1QK

VOIP End-To-End Security using S/MIME and a Security Toolbox

Md. Shahidul Islm
Md. Shahidul Islm Rajshahi University of Engineering & Technology
DOI

Abstract

Voice Over Internet Protocol (VOIP) is a rapidlygrowing Internet service for telephone communication. However, while it offers a number of cost advantages over traditional telephone service, it can pose a security threat, especially when used over public networks. In the absence of sufficient security, users of public networks are open to threats such as identity theft, man-in-the-middle attack, interception of messages/eavesdropping, DOS attacks, interruption of service and spam. S/MIME adds security to the message itself and can be used to provide end-to-end security to SIP. S/MIME can also offer confidentiality or integrity, or both, but it does not provide any anti-replay protection. However, we propose to use a unified architecture for the implementation of security protocols in the form of a security toolbox system. It will prevent an attack against anti-replay.

VOIP End-To-End Security using S/MIME and a Security Toolbox

Voice Over Internet Protocol (VOIP) is a rapidlygrowing Internet service for telephone communication. However, while it offers a number of cost advantages over traditional telephone service, it can pose a security threat, especially when used over public networks. In the absence of sufficient security, users of public networks are open to threats such as identity theft, man-in-the-middle attack, interception of messages/eavesdropping, DOS attacks, interruption of service and spam. S/MIME adds security to the message itself and can be used to provide end-to-end security to SIP. S/MIME can also offer confidentiality or integrity, or both, but it does not provide any anti-replay protection. However, we propose to use a unified architecture for the implementation of security protocols in the form of a security toolbox system. It will prevent an attack against anti-replay.

Md. Shahidul Islm
Md. Shahidul Islm Rajshahi University of Engineering & Technology

No Figures found in article.

Md. Shahidul Islm. 2015. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 14 (GJCST Volume 14 Issue E2): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 14 Issue E2
Pg. 53- 56
Classification
Not Found
Article Matrices
Total Views: 8749
Total Downloads: 2179
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

VOIP End-To-End Security using S/MIME and a Security Toolbox

Md. Shahidul Islm
Md. Shahidul Islm Rajshahi University of Engineering & Technology

Research Journals