Abstract: Voice over the Internet protocol (VOIP) is being rapidly deployed, and the convergence of the voice and data worlds is introducing exciting opportunities. Lower cost and greater flexibility are the key factors luring enterprises to transition to VoIP. Some security problems may surface with the widespread deployment of VoIP. In this article, we discuss these security problems and propose a high-level security architecture that captures required features at each boundary-network-element in the VoIP infrastructure. We describe mechanisms to efficiently integrate information between distributed security components in the architecture.
Keywords: VoIP security, Threats, Feedback, VOIP attacks, Security solutions
Title: VOIP Pros and Cons
Author: Roopa Dinakar Patil, Tejashree Ravikant Sawakare
International Journal of Electrical and Electronics Research
ISSN 2348-6988 (online)
Research Publish Journals