Secure communication and VoIP threats in next generation networks

annif.suggestionsInternet|information networks|data security|data communications|mobile communication networks|telephone traffic|data communications networks|protocols|service producers|net calls|enen
annif.suggestions.linkshttp://www.yso.fi/onto/yso/p20405|http://www.yso.fi/onto/yso/p12936|http://www.yso.fi/onto/yso/p5479|http://www.yso.fi/onto/yso/p5446|http://www.yso.fi/onto/yso/p12758|http://www.yso.fi/onto/yso/p12420|http://www.yso.fi/onto/yso/p1957|http://www.yso.fi/onto/yso/p9894|http://www.yso.fi/onto/yso/p12069|http://www.yso.fi/onto/yso/p22970en
dc.contributor.authorHossein Ahmadzadegan, M.
dc.contributor.authorElmusrati, M.
dc.contributor.authorMohammadi, H.
dc.contributor.departmentfi=Ei tutkimusalustaa|en=No platform|-
dc.contributor.facultyfi=Tekniikan ja innovaatiojohtamisen yksikkö|en=School of Technology and Innovations|-
dc.contributor.organizationfi=Vaasan yliopisto|en=University of Vaasa|
dc.date.accessioned2020-06-25T09:26:56Z
dc.date.accessioned2025-06-25T12:42:02Z
dc.date.available2020-06-25T09:26:56Z
dc.date.issued2013-09
dc.description.abstractVoIP services are among key issues in the Next Generation Network (NGN) for the telecommunication domain. This technology is comprised of positive and negative aspects like similar emerging technologies. Nowadays, telecom operators provide call waiting, conference calling, call transfer, caller ID and other VoIP services based on NGN and all IP solution. Thus, VoIP security is now one of the issues over which many debates take place. In this paper we have decided to concentrate on vulnerability categories for VoIP services in NGN. We try to present the common security threats and vulnerabilities of VoIP services. Determining the vulnerabilities and their classification, together with the risks that this system is threatened by clarifies the ways to penetrate this system and enables administrators to solve the problems. The debate on this matter would be misleading without having full recognition of various specifications. In addition, to make the importance of identifying these types of vulnerabilities clear, we will classify the probability threats for VoIP.-
dc.description.notificationCreative Commons Attribution Share Alike License-
dc.description.reviewstatusfi=vertaisarvioitu|en=peerReviewed|-
dc.format.bitstreamtrue
dc.format.contentfi=kokoteksti|en=fulltext|-
dc.format.extent5-
dc.format.pagerange630-634-
dc.identifier.olddbid12422
dc.identifier.oldhandle10024/11229
dc.identifier.urihttps://osuva.uwasa.fi/handle/11111/740
dc.identifier.urnURN:NBN:fi-fe2020062545742-
dc.language.isoeng-
dc.publisherWorld Academy of Science, Engineering and Technology (WASET)-
dc.relation.doi10.7763/IJCCE.2013.V2.263-
dc.relation.ispartofjournalInternational Journal of Computer and Communication Engineering-
dc.relation.issn2010-3743-
dc.relation.issue5-
dc.relation.urlhttp://www.ijcce.org/papers/263-OC0024-
dc.relation.volume2-
dc.rightsCC BY-SA 4.0-
dc.source.identifierhttps://osuva.uwasa.fi/handle/10024/11229
dc.subjectIMS-
dc.subjectnext generation networks-
dc.subjectsystem security-
dc.subjectVoIP-
dc.subject.disciplinefi=Tietoliikennetekniikka|en=Telecommunications Engineering|-
dc.subject.ysoInternet-
dc.subject.ysoinformation networks-
dc.subject.ysodata security-
dc.subject.ysodata communications-
dc.subject.ysomobile communication networks-
dc.subject.ysotelephone traffic-
dc.subject.ysodata communications networks-
dc.subject.ysoprotocols-
dc.subject.ysoservice producers-
dc.subject.ysonet calls-
dc.titleSecure communication and VoIP threats in next generation networks-
dc.type.okmfi=A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä|en=A1 Peer-reviewed original journal article|sv=A1 Originalartikel i en vetenskaplig tidskrift|-
dc.type.publicationarticle-
dc.type.versionpublishedVersion-

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
Ahmadzadegan_ym_2013.pdf
Size:
1.64 MB
Format:
Adobe Portable Document Format
Description:
article

Kokoelmat