A VoIP Privacy Mechanism and its Application in VoIP Peering for Voice Service Provider Topology and Identity Hiding
نویسندگان
چکیده
Voice Service Providers (VSPs) participating in VoIP peering frequently want to withhold their identity and related privacy-sensitive information from other parties during the VoIP communication. A number of existing documents on VoIP privacy exist, but most of them focus on end user privacy. By summarizing and extending existing work, we present a unified privacy mechanism for both VoIP users and service providers. We also show a case study on how VSPs can use this mechanism for identity and topology hiding in VoIP peering.
منابع مشابه
Presence and Instant Messaging Peering Use Cases
This document describes several use cases of peering of non-VoIP (Voice over IP) services between two or more Service Providers. These Service Providers create a peering relationship between themselves, thus enabling their users to collaborate with users on the other Service Provider network. The target of this document is to drive requirements for peering between domains that provide the non-V...
متن کاملDeveloping Fuzzy Models for Estimating the Quality of VoIP
This paper presents a novel method for modeling the one-way quality prediction of VoIP, non-intrusively. Intrusive measures of voice quality suffer from common deficiency that is the need of reference signal for evaluating the quality of voice. Owing to this lack, a great deal of effort has been recently devoted for modeling voice quality prediction non-intrusively according to quality degradat...
متن کاملThe Role of Session Border Controllers in the DMZ of Voice over IP(VoIP) Networks
SBCs usually sit between two service provider networks in a peering environment, or between an access network and a backbone network to provide service to residential and/or enterprise customers. They provide a variety of functions to enable or enhance session-based multi-media services (e.g., Voice over IP). This thesis analyzes the internet structure of SBC and shows single-box and dual-box S...
متن کاملVoIP in an Internet service provider network
[email protected] I N TH I S A RT I C L E , I TA K E A LOOK AT how “traditional” Internet Service Providers deploy Voice over IP (VoIP) [1] in their networks. VoIP gets a lot of press these days, and there seems to be no end to the hype surrounding it, especially when it comes to service provider networks. This article makes no attempt to cover the basics of VoIP (see Heison Chak’s excellent ...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/0807.1169 شماره
صفحات -
تاریخ انتشار 2006