Abstract
Other security protocols can be employed to protect the Voice over IP (VoIP) depending on the user needs. These include Secure Real-Time Transport Protocol (SRTP), or securing the actual Real-Time Transport Protocol (RTP) packets on the media channel, Zimmerman Real-Time Transport Protocol (ZRTP), and secure Session Initiation Protocol (SIP). When looking at the way to secure the VoIP, two things come to mind: first is the signaling and control channel (SIP) and second is the media channel (RTP). Initially no one cared about the call setup and teardown, until the SIP messages were manipulated and calls could be redirected to a third party or forked to multiple extensions. When this became evident, SIP became a target for securing the actual signaling messages. Later when eavesdropping and MITM attacks occurred, the media channel became the new venture for securing VoIP. The security protocols were developed as an afterthought but are now maturing to a point of being readily available. Multimedia Internet KEYing (MIKEY) is another protocol used to secure the RTP.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.