Submitted in Partial Fulfillment of Award of Degree Of
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Wiretapping End-To-End Encrypted Voip Calls: Real-World Attacks on ZRTP
Preprint Version, Accepted for Publication in PoPETS 2017; 2017 (3):1–17 Dominik Schürmann*, Fabian Kabus, Gregor Hildermeier, and Lars Wolf Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP Abstract: Voice calls are still one of the most com- saging apps, such as WhatsApp and Facebook Messen- mon use cases for smartphones. Often, sensitive personal ger [10, 36]. As a result, mobile messaging, the most information but also confidential business information popular smartphone feature, finally includes end-to-end is shared. End-to-end security is required to protect encryption for average users. Comparing their security against wiretapping of voice calls. For such real-time features with that of voice calls shows a major imbal- communication, the ZRTP key-agreement protocol has ance. While making voice calls is the second most popu- been proposed. By verbally comparing a small number lar smartphone feature with 93% popularity [25], its se- of on-screen characters or words, called Short Authenti- curity is often neglected. It is difficult to retrofit the tra- cation Strings, the participants can be sure that no one ditional Public Switched Telephone Network with end- is wiretapping the call. Since 2011, ZRTP is an IETF to-end security, but it is feasible to protect users of mod- standard implemented in several VoIP clients. ern Voice over IP (VoIP) apps. In this paper, we analyzed attacks on real-world VoIP To protect real-time communication channels, the systems, in particular those implementing the ZRTP ZRTP key agreement protocol has been proposed. Based standard. We evaluate the protocol compliance, er- on the Diffie-Hellmann (DH) key exchange, it has been ror handling, and user interfaces of the most common standardized in 2011 as RFC 6189 [38]. -
(Issn 2249-3905) Impact Factor – 1.776
IJREAS VOLUME 4, ISSUE 3 (MARCH 2014) (ISSN 2249-3905) IMPACT FACTOR – 1.776 SEGREGATION OF IP TELEPHONY PROTOCOL IN ANDROID AND WINDOWS CELL PHONES Shivani Chaudhary* Preety Joon** ___________________________________________________________________________ ABSTRACT VoIP oftenly known as IP telephony emerged as convenient protocol for transmission of voice through internet connections. VoIP technology is involved in the delivery of voice communication & multimedia sessions over ip networks. VoIP is available on many smart phones & internet devices so that users of portable devices, may place calls or send sms over 3G or Wi-Fi. The main focus of this paper is to study the VoIP technology in windows & android cell phones. Keywords— VoIP telephony, signalling control protocol, media control protocol. ___________________________________________________________________________ *Department of Computer Science, Ditm, Gannaur,Sonepat **Department of Computer Science, Ditm,Gannuar,Sonepat International Journal of Research in Engineering & Applied Sciences http://www.euroasiapub.org 161 IJREAS VOLUME 4, ISSUE 3 (MARCH 2014) (ISSN 2249-3905) IMPACT FACTOR – 1.776 I. INTRODUCTION Voice over IP (VoIP, abbreviation of voice over Internet Protocol) commonly refers to the communication protocols, technologies, methodologies, and transmission techniques involved in the delivery of voice communitions and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, -
IP Telephony Best Practice in EU National Research Networks
Set of IP Telephony Best Practices in National Research Networks in EU Best Practice Document Produced by CESNET led working group on Multimedia transmissions and collaborative environment (CBPD146) Miroslav VOZNAK, et al. March 2011 © TERENA 2011. All rights reserved. Document No: GN3-NA3-T4-CBPD146 Version / date: March 7, 2011 Original language : EN Original title: “Set of IP Telephony Best Practices in National Research Networks in EU” Original version / date: V1.2 of March 7, 2011 Contact: [email protected] Editor: Miroslav VOZNAK, [email protected] CESNET, z. s. p. o. Zikova 4, 160 00 Praha 6 Czech Republic Authors : Miroslav VOZNAK , CESNET, Czech Republic, 1 st chapter and editing all chapters nd Ulf TIGERSTED , CSC Ltd., Finland, 2 chapter rd Branko RADOJEVIC , CARNET, Croatia, 3 chapter th Michal HALAS , STU, Slovakia, 4 chapter th Miguel DUARTE , FCCN, Portugal, 5 chapter CESNET bears responsibility for the content of this document. Parts of the report may be freely copied, unaltered, provided that the original source is acknowledged and copyright preserved. The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement n° 23 8875, relating to the project 'Multi-Gigabit European Research and Education Network and Associated Services (GN3)'. 2 About Authors Miroslav VOZNAK holds a position as an associate professor at Department of telecommunications in Ostrava, Czech Republic. He received his M.S. and Ph.D. degrees in telecommunications from the VSB – Technical University of Ostrava, in 1995 and 2002, respectively. He is author or co-author more than 130 publications indexed in database of Research and Development in Czech Republic. -
Versus Packet Loss for G.711 Codec
Improved Performance of Secured VoIP Via Enhanced Blowfish Encryption Algorithm by Amzari Jihadi Ghazali Submitted in accordance with the requirements for the award of the degree of Master of Philosophy of the University of Liverpool JUNE 2019 ABSTRACT Both the development and the integration of efficient network, open source technology, and Voice over Internet Protocol (VoIP) applications have been increasingly important and gained quick popularity due to new rapidly emerging IP-based network technology. Nonetheless, security and privacy concerns have emerged as issues that need to be addressed. The privacy process ensures that encryption and decryption methods protect the data from being alternate and intercept, a privacy VoIP call will contribute to private and confidential conversation purposes such as telebanking, telepsychiatry, health, safety issues and many more. Hence, this study had quantified VoIP performance and voice quality under security implementation with the technique of IPSec and the enhancement of the Blowfish encryption algorithm. In fact, the primary objective of this study is to improve the performance of Blowfish encryption algorithm. The proposed algorithm was tested with varying network topologies and a variety of audio codecs, which contributed to the impact upon VoIP network. A network testbed with seven experiments and network configurations had been set up in two labs to determine its effects on network performance. Besides, an experimental work using OPNET simulations under 54 experiments of network scenarios were compared with the network testbed for validation and verification purposes. Next, an enhanced Blowfish algorithm for VoIP services had been designed and executed throughout this research. From the stance of VoIP session and services performance, the redesign of the Blowfish algorithm displayed several significant effects that improved both the performance of VoIP network and the quality of voice. -
Project Report On
Project Report on JustTalk: An instant messaging and VoIP calling based android application Project Report submitted in partial fulfilment of the requirement for the degree of Bachelor of Technology. in Computer Science & Engineering Under the Supervision of Ms. Nishtha Ahuja By Aman Khurana (Roll no-111284) To Jaypee University of Information and Technology Waknaghat, Solan – 173234, Himachal Pradesh Certificate This is to certify that project report entitled ―JustTalk: an android application‖, submitted by Aman Khurana in partial fulfillment for the award of degree of Bachelor of Technology in Computer Science & Engineering to Jaypee University of Information Technology, Waknaghat, Solan has been carried out under my supervision. This work has not been submitted partially or fully to any other University or Institute for the award of this or any other degree or diploma. Date: Supervisor’s Name: Ms Nishtha Ahuja Designation: Assistant Professor ii Acknowledgement I take this opportunity to express our sincere thanks and deep gratitude to all those people who extended their wholehearted co-operation and helped me in completing this project successfully. First of all, I would like to thank Dr S.P Ghrera (Head of Department, CSE) for creating opportunities .Special thanks to Ms Nishtha Ahuja, Project Mentor for all the help and guidance extended to me by her in every stage during our project development. Her inspiring suggestions and timely guidance enabled us to perceive the various aspects of the project in a new light. I am highly indebted and grateful for her strict supervision, constant encouragement, inspiration and guidance, which ensure the worthiness of our work. -
INTERNET TELEPHONY® Internet Telephony Is Revolutionizing Telecommunications Through the Con- Carrier for Wholesale Minutes and All That
Where Can You Turn for a Total Solution? As a total solutions provider, NEC understands the complexities today’s converged networks can present to your business. With our proven experience, we know what it takes to help you avoid traveling in the wrong direction. NEC delivers the most choices of IP communications platforms to meet the unique needs of your business. Add to that a strong portfolio of applications and services, and before you know it, your business is traveling in the direction of improved customer experience, enhanced employee productivity, increased revenue generation and maximum return on investment. Why go in different directions when you can focus on a Total Solution? Turn to NEC! www.necunified.com/tmc © 2006 NEC Corporation NEC and the NEC logo are registered trademarks of NEC Corporation. By Greg Galitzine Group Publisher and Editor-In-Chief, Rich Tehrani ([email protected]) EDITORIAL Mobile Me: Editorial Director, Greg Galitzine ([email protected]) Associate Editor, Erik Linask Some Predictions Are ([email protected]) Contributing Editor, Johanne Torres TMC LABS Easier Than Others Executive Technology Editor/CTO/VP, Tom Keating ([email protected]) ART Senior Art Director, Lisa D. Morris Art Director, Alan Urkawich This year is barely six weeks old, and already EXECUTIVE OFFICERS there’s lots of speculation regarding the next “big Nadji Tehrani, Chairman and CEO thing.” Who — or what — will be this year’s Tech Rich Tehrani, President Dave Rodriguez, VP of Publications Darling? What will be the “it” that can stand in and Conferences Kevin J. Noonan, Executive Director, for the “it” in all those eBay commercials? Business Development Whatever “it” is, “it” will have to be more than Michael Genaro, VP of Marketing Editorial Offices: 203-852-6800 practical and cool. -
Unclassified DSTI/ICCP/CISP(2007)14/FINAL
Unclassified DSTI/ICCP/CISP(2007)14/FINAL Organisation de Coopération et de Développement Économiques Organisation for Economic Co-operation and Development 02-Jun-2009 ___________________________________________________________________________________________ English - Or. English DIRECTORATE FOR SCIENCE, TECHNOLOGY AND INDUSTRY COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY Unclassified DSTI/ICCP/CISP(2007)14/FINAL Working Party on Communication Infrastructures and Services Policy ENUM: CONVERGING TELEPHONE NUMBERS AND ADDRESSES IN NEXT GENERATION NETWORKS English - Or. English JT03265763 Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format DSTI/ICCP/CISP(2007)14/FINAL FOREWORD The Working Party on Communication Infrastructures and Services Policy (CISP) discussed this paper at its meetings in December 2007 and finalised it in December 2008. The Working Party agreed to recommend the paper for declassification to the ICCP Committee. The ICCP Committee agreed to the declassification of the paper in March 2009. The paper was drafted by Thomas de Haan, from the Ministry of Economic Affairs, The Netherlands, while on assignment to the OECD. © OECD/OCDE 2009. 2 DSTI/ICCP/CISP(2007)14/FINAL TABLE OF CONTENTS ENUM, CONVERGING TELEPHONE NUMBERS AND ADDRESSES IN NEXT GENERATION NETWORKS .................................................................................................................................................. 5 Main Points ................................................................................................................................................ -
Quality of Service Support for Voice Over IP in Wireless Access Networks
Quality of Service Support for Voice over IP in Wireless Access Networks by Cristian Olariu Under the supervision of: Dr.Ruairí de Fréin Prof.Liam Murphy Thesis submitted in partial fulfilment of the requirements for the award of Doctor of Philosophy November 2013 Department of Computing,Mathematics and Physics Waterford Institute of Technology I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of Doctor of Philosophy is entirely my own work and has not been taken from the work of others save to the extent that such work has been cited and acknowledged within the text of my work. Signed: ID number: W20050956 Date: 6th of November, 2013 i Abstract Voice Over IP (VoIP) is increasingly displacing traditional voice tele- phony services, but the IP networks that carry the traffic are inherently prone to delays and losses that impact the voice quality. This thesis ad- dresses those quality degradations with particular emphasis on wireless networks. The scenarios considered in the thesis focus on the two most recent wire- less access technologies, namely Long Term Evolution (LTE) and Wireless Mesh Networks (WMNs). These scenarios have in common the unde- sired effects of call quality degradation when the increased traffic volume across the network causes congestion. This thesis points out the causes of the congestion and proposes solutions tailored specially for each wireless access technology. The solutions share a common concept, proposed and developed in this thesis, namely the Intermediate Mean Opinion Score (iMOS). The MOS is basically a call quality assessment methodology typically performed at the end-points. -
Awireless Local Area Network Soft Cell Phone (SCP) System with Multimedia and Data Services
I.J.Computer Network and Information Security, 2014, 2, 9-15 Published Online January 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2014.02.02 AWireless Local Area Network Soft Cell Phone (SCP) System with Multimedia and Data Services Olakanmi O.Oladayo Electrical and Electronic Engineering, Technology Drive, Office 6, New Faculty of Engineering Building. University of Ibadan, Ibadan Nigeria [email protected] Abstract—Most organizations concurrently maintain amethodology and group of technologies for the delivery private Automatic Branch Exchange (PABX) and Local of voice communications and multimedia sessions over Area Network (LAN) for information interchange within Internet Protocol (IP) networks, such as the Internet. their organization. This is obviously a waste of resources Other terms commonly associated with VoIP are IP and avoidable duplication of communication systems. telephony, Internet telephony, voice over broadband The existing LAN can be used as a communication (VoBB), broadband telephony, IP communications, and backbone for the in house telephone operations with no broadband phone service. extra cost and resources. In view of this, a portable and a The term Internet telephony specifically refers to the platform independent Software-Based Cell Phone (SCP) provisioning of communications services (voice, fax, was proposed for the existing LANs infrastructure in the SMS, voice-messaging) over the public Internet, rather organizations. than via the public switched telephone network (PSTN). The SPC is a telephony application with a user The steps and principles involved in originating VoIP friendly interface which is capable of handling voice, telephone calls are similar to traditional digital video and text messages without compromising the telephony, and involve signaling, channel setup, Quality of Service (QoS) of the existing LAN.