{"title":"使用VPN (virtual private networks)和IPSec (Internet Protocol Security)的安全voIP (voice over Internet Protocol)","authors":"Sergio Chacón, D. Benhaddou, D. Gurkan","doi":"10.1109/TPSD.2006.5507428","DOIUrl":null,"url":null,"abstract":"The transmission of voice information over the Internet Protocol (VoIP) offers many security challenges. After identification of the security risks, it becomes clear that most of the vulnerabilities occur in the way that voice information is handled in the IP layer [1]. This study proposes a solution using dedicated VPN-based local area firewalls. These firewalls provide more security than a border router by making the voice information less susceptible to attacks from an insider to the network. Plus, they can easily and reliably handle and protect several types of clients in small office environments, control access restricting traffic coming into the inside network and encrypt IP voice packets using IPSec tunneling before the voice packets reach the access switch.","PeriodicalId":385396,"journal":{"name":"2006 IEEE Region 5 Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Secure voice over Internet Protocol (voIP) using virtual private networks (VPN) and Internet Protocol Security (IPSec)\",\"authors\":\"Sergio Chacón, D. Benhaddou, D. Gurkan\",\"doi\":\"10.1109/TPSD.2006.5507428\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The transmission of voice information over the Internet Protocol (VoIP) offers many security challenges. After identification of the security risks, it becomes clear that most of the vulnerabilities occur in the way that voice information is handled in the IP layer [1]. This study proposes a solution using dedicated VPN-based local area firewalls. These firewalls provide more security than a border router by making the voice information less susceptible to attacks from an insider to the network. Plus, they can easily and reliably handle and protect several types of clients in small office environments, control access restricting traffic coming into the inside network and encrypt IP voice packets using IPSec tunneling before the voice packets reach the access switch.\",\"PeriodicalId\":385396,\"journal\":{\"name\":\"2006 IEEE Region 5 Conference\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 IEEE Region 5 Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TPSD.2006.5507428\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE Region 5 Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TPSD.2006.5507428","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure voice over Internet Protocol (voIP) using virtual private networks (VPN) and Internet Protocol Security (IPSec)
The transmission of voice information over the Internet Protocol (VoIP) offers many security challenges. After identification of the security risks, it becomes clear that most of the vulnerabilities occur in the way that voice information is handled in the IP layer [1]. This study proposes a solution using dedicated VPN-based local area firewalls. These firewalls provide more security than a border router by making the voice information less susceptible to attacks from an insider to the network. Plus, they can easily and reliably handle and protect several types of clients in small office environments, control access restricting traffic coming into the inside network and encrypt IP voice packets using IPSec tunneling before the voice packets reach the access switch.