A survey of SIP authentication and key agreement schemes

HH Kilinc, T Yanik - IEEE communications surveys & tutorials, 2013 - ieeexplore.ieee.org
We present a survey of authentication and key agreement schemes that are proposed for the
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …

A comprehensive survey of voice over IP security research

AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …

Identity and content authentication for phone calls

PG Traynor, BG Reaves, LE Blue, L Vargas… - US Patent …, 2020 - Google Patents
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …

Design of an asterisk-based VoIP system and the implementation of security solution across the VoIP network

W Tuleun - World Journal of Advanced Research and Reviews, 2024 - wjarr.co.in
Voice over Internet Protocol (VoIP) is a rapidly advancing technology that facilitates the
transmission of voice and audio signals over the Internet or an IP-based network in real …

Sok: Everyone hates robocalls: A survey of techniques against telephone spam

H Tu, A Doupé, Z Zhao, GJ Ahn - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Telephone spam costs United States consumers $8.6 billion annually. In 2014, the Federal
Trade Commission has received over 22 million complaints of illegal and wanted calls …

[PDF][PDF] A new speech encryption algorithm based on dual shuffling Hénon chaotic map

OM Al-Hazaimeh - International Journal of Electrical and …, 2021 - researchgate.net
Over the past few decades, many algorithms have been proposed to improve the
performance of speech encryption over un-secure channel (ie, Internet). In this paper, the …

VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain

M Kara, HRJ Merzeh, MA Aydın, HH Balık - Computer Communications, 2023 - Elsevier
Abstract Confidentiality, availability, integrity, authentication, and non-repudiation when
together became the top priority for secure communication. However, authentication is the …

[PDF][PDF] A new dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol

OM Al-Hazaimeh - International Journal of Electrical and Computer …, 2020 - academia.edu
This paper introduces a dynamic speech encryption algorithm based on Lorenz chaotic map
over internet protocol to enhance the services of the real-time applications such as …

A novel approach for efficient mitigation against the SIP-based DRDoS attack

IM Tas, S Baktir - Applied Sciences, 2023 - mdpi.com
Voice over Internet Protocol (VoIP) and its underlying Session Initiation Protocol (SIP) are
widely deployed technologies since they provide an efficient and fast means of both voice …

A review of cyber threats and defence approaches in emergency management

G Loukas, D Gan, T Vuong - Future Internet, 2013 - mdpi.com
Emergency planners, first responders and relief workers increasingly rely on computational
and communication systems that support all aspects of emergency management, from …