Skip to main content
Article thumbnail
Location of Repository

VoIP in the Context of Security

By Fiifi Botwe Arkaah


The wide spread deployment of enterprise networks and its capacity to carry voice traffic over the internet has spear-headed the march forward for IP-telephony or voice over internet protocol (VoIP). Unfortunately, the internet which is based on IPv4 public networks was not built to anticipate the security problems that could be passed on to this evolving technology. Moreover, VoIP has been challenged to provide better quality of service (QoS) in addition to its much hyped or promised value added services. A much better way to mitigate these IPv4 network security issues is to adopt a defence-in-depth approach which would include a migration to a less faulty network service protocol such as IPv6 and the separation of voice, signalling and data services into different segments in a single network. An IPv6 deployment will offer mandatory confidentiality, authentication, integrity and non-repudiation services with the help of the internet security protocol IPSec which properly addresses the issue of message origin in IPv4. Moreover, the separation of VoIP critical services into different layers would help allocate enough resources based on priority which in turn will improve QoS and security. Currently, the technology used in achieving QoS and security involves Etherne

Topics: Contents
Year: 2006
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.