VoIP Technology: Investigation of QoS and Security Issues

Full Text (PDF, 340KB), PP.65-76

Views: 0 Downloads: 0

Author(s)

Amor Lazzez 1,*

1. Taif University, Kingdom of Saudi Arabia

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2014.07.09

Received: 1 Sep. 2013 / Revised: 20 Dec. 2013 / Accepted: 23 Feb. 2014 / Published: 8 Jun. 2014

Index Terms

VoIP, Security Issues, QoS Concerns, Analysis

Abstract

Voice over IP (VoIP) is the technology allowing voice traffic transmission as data packets over a private or a public IP network. VoIP allows significant benefits for customers and communication services providers. The main are cost savings, rich media service, phone and service portability and mobility, and the integration with other applications. Nevertheless, the deployment of the VoIP technology encounters many challenges such as architecture complexity, interoperability problems, QoS concerns, and security issues. Due to the inability of the IP networking technology to support the stringent QoS constraints of voice traffic, and the incapability of traditional security mechanisms to adequately protect VoIP systems from recent intelligent attacks, QoS and security issues are considered as the most serious challenges for successful deployment of the VoIP technology. The aim of this paper is to carry out a deep analysis of the security issues and QoS concerns of the VoIP technology. Firstly, we present a brief overview about the VoIP technology. Then, we discuss the QoS problems encountering the deployment of the VoIP technology. The presented discussion mainly address the QoS issues related to the use of the IP networking technology, the QoS concerns related to voice clarity, and the QoS mechanisms proposed to support voice traffic QoS constraints. After that, we investigate the security issues of the VoIP technology. The presented investigation mainly address the vulnerabilities and security attacks of VoIP systems, as well as the countermeasures that should be considered to help the deployment of secured VoIP systems.

Cite This Paper

Amor Lazzez, "VoIP Technology: Investigation of QoS and Security Issues", International Journal of Information Technology and Computer Science(IJITCS), vol.6, no.7, pp.65-76, 2014. DOI:10.5815/ijitcs.2014.07.09

Reference

[1]Olivier Hersent, Jean-Pierre Petit, and David Gurle, “Beyond VoIP Protocols: Understanding Voice Technology and Networking Techniques for IP Telephony”, Wiley; 1 edition (March 4, 2005), Edition 1, ISBN-10: 0470023627 

[2]Network World, Cisco Subnet, “Working with VoIP”, Internet: http://www.networkworld.com/subnets/cisco/011309-ch1-voip-security.html, May 2013. 

[3]Jonathan Davidson, and Tina Fox, “Deploying Cisco® Voice over IP Solutions”, Cisco Press, 2001, Print ISBN-10: 1-58705-030-7, Print ISBN-13: 978-1-58705-030-5. 

[4]Jonathan Davidson, James Peters, Manoj Bhatia, Satish Kalidindi, and Sudipto Mukherjee, “Voice over IP Fundamentals”, Cisco Press, July 2006, Print ISBN-10: 1-58705-257-1, Print ISBN-13: 978-1-58705-257-6. 

[5]Theodore Wallingford, “Switching to VoIP”, O'Reilly Media, Inc., June 2005, Print ISBN-13: 978-0-596-00868-0, Print ISBN-10: 0-596-00868-6. 

[6]Meisel, J.B. and Needles, M. (2005), ‘‘Voice over internet protocol (VoIP) development and public policy implications’’, info, Vol. 7 No. 3, pp. 3-15. 

[7]Amor Lazzez, and Thabet Slimani, “Deployment of VoIP Technology:QoS Concerns”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 9, September 2013. 

[8]Amor Lazzez, “VoIP Technology: Security Issues Analysis”, International Journal of Emerging Trends & Technology in Computer Science, Vol. 2, Issue, July-August 2013.

[9]Amor Lazzez, Wissem Ben fredj, Thabet Slimani “IAX-Based Peer-to-Peer VoIP Architecture”, International Journal of Computer Science Issues, volume 10, Issue 3, May 2013. 

[10]Patrick park, “voice over IP Security “, Cisco Press, September 2008, ISBN-10: 1-58705-469-8. 

[11]Andrew Froehlich, “CVOICE 8.0: Implementing Cisco Unified Communications Voice over IP and QoS v8.0: Study guide”, Sybex, Novmber 2011, Print ISBN : 978-0-470-91623-0, Web ISBN: 0-470916-23-0. 

[12]Kevin Wallace, “Implementing Cisco Unified Communications Voice over IP and QoS (CVOICE) Foundation Learning Guide: (CCNP Voice CVoice 642-437)”, Cisco Press, May 2011, Print ISBN-10: 1-58720-419-3, Web ISBN-10: 0-13-210342-7. 

[13]Tim Szigeti - CCIE No. 9794; Christina Hattingh, “End-to-End QoS Network Design”, Cisco Press, Print ISBN-10: 1-58705-176-1, Print ISBN-13: 978-1-58705-176-0. 

[14]Jonathan Davidson; Tina Fox, “Deploying Cisco Voice over IP Solutions”, Cisco Press, November 2001, Print ISBN-10: 1-58705-030-7, Print ISBN-13: 978-1-58705-030-5. 

[15]Michael Valentine,” CCNA Voice Quick Reference”, Cisco Press, July 2008, Print ISBN-10: 1-58714-337-2, Web ISBN-10: 1-58705-810-3. 

[16] Vinod Joseph, and Brett Chapman, “Deploying QoS for Cisco IP and Next-Generation Networks: The Definitive Guide”, Morgan Kaufmann, April 2009, Print ISBN-13: 978-0-12-374461-6, Web ISBN-13: 978-0-08-092255-3. 

[17]Peter Thermos; Ari Takanen, “Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures”, Addison-Wesley Professional, August 2007, ISBN-10: 0-321-43734-9. 

[18]S. Niccolini. 2006. VoIP Security Threats. http://tools.ietf.org/id/draft-niccolini-speermint-voipthreats-00.txt. 

[19]Nico Schwan, Thomas Strauss, and Marco Tomsu, “Peer-to-Peer VoIP & MMoIP for Public Services – Requirements and Architecture”, Alcatel-Lucent Deutschland AG, Research & Innovation, Lorenzstrasse 10, 70435 Stuttgart, Germany.

[20]Internet Engineering Task Force, P2PSIP Working Group “draft-ietf-p2psip-service-discovery-08.txt”, February 2013.

[21]Martínez-Yelmo Isaías, Bikfalvi Alex, Cuevas Rubén, Guerrero Carmen, and Garcia Jaime, “H-P2PSIP: Interconnection of P2PSIP domains for Global Multimedia Services based on a Hierarchical DHT Overlay Network”, Elseiver, Mars 2009, Computer Networks, Vol. 53, Issue 4, March 2009, pp. 556-568.

[22]David Schwartz, “A Comparison of Peer-To-Peer and Client-Server Architectures in VoIP Systems”, Internet: http://www.tmcnet.com/voip/0406/featurearticle-comparison-of-peer-to-peer.htm, May 2013.

[23]J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol. RFC 3261 (Proposed Standard), June 2002. Updated by RFCs 3265, 3853, 4320, 4916.

[24]Internet Engineering Task Force (2009b), “IAX: Inter-Astersik eXchange version 2”, RFC 5456, Internet Engineering Task Force, Fremont, CA.

[25]Mohamed Boucadair, “ Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks”, 2009 John Wiley & Sons Ltd. ISBN: 978-0-470-77072-6.

[26]Jim Van Meggelen, Jared Smith, and Leif Madsen, “Asterisk: The Future of Telephony”, O'Reilly Media, September 2005, ISBN-10: 0596009623.