IP telephony: mobility and security IP telephony: mobility and security
نویسنده
چکیده
With the introduction of IP based telephony services, the Internet has started to challenge the traditional PSTN networks as an infrastructure for providing real-time interactive services. This upcoming paradigm shift is not only driven by the desire to provide cost efficient solutions, but by basing the communication on IP we expect that the end-users will experience a greater set of attractive services over a single connection compared to what is provided by a PSTN today. Looking a little further ahead, mobile communication systems will also become IP based. Companies, universities and private persons have started to extend their local area networks to provide wireless access by attaching wireless access points (APs) to their LAN. Wireless ISPs (WISPs) are putting up wireless LAN (WLAN) APs at public hot spots, thereby providing a complement or even a competitive alternative to the wireless WANs (WWANs) being developed and deployed today. As more and more people start to communicate using WLAN access, they will naturally wish to use this infrastructure for interactive real-time applications, such as mobile telephony. This thesis concerns mobility and security support for IP telephony in public WLAN environments. The security issues addressed relate both to user requirements such as end-to-end confidentiality, and operator requirements such as network access control. Alternatives for how the voice media stream can be protected and the procedure to establish a secure call using SIP are described. Public WLAN architectures enabling service providers to share access network infrastructure are described and evaluated. To enforce access control the use of either IEEE 802.11i or L2TP/IPSec is suggested, since both meet the proposed security requirements, and both are standardized solutions available on modern systems. The case where mobile users perform handovers between APs on the same LAN (layer-2 handover) and across IP subnets (layer-3) is studied. For layer-2 handovers the properties of IEEE 802.11b handover mechanisms and its impact on voice traffic, and the effect of the network access control mechanism on the handover performance are examined. The mechanisms necessary to perform layer-3 handovers and their impact on handover performance are described. The analysis focus on “SIP mobility” and Mobile IPv6, since these mobility management schemes provide optimal routing, thus are well suited for IP telephony.
منابع مشابه
A Survey of Requirements and Standardization Efforts for IP-Telephony-Security
Security as a dimension of trustworthiness in IP-Telephony systems and protocols is a main condition for the commercial success of IP-Telephony. In this work, we present a survey of security requirements and show how various standardization efforts address these requirements. We describe the basic tasks and elements of IP-Telephony systems and compare them to Telephony via PSTNs to derive some ...
متن کاملA Comparison of IP mobility protocols
Third generation wideband mobile networks are becoming a reality. Many operators are at the point of proposing GPRS (and soon UMTS) services to their customers. All these are actually evolving towards all-IP networks. This represents the fusion between the two famous current network technologies: the Internet and the mobile telephony/networking. IP which was designed to work with classical stat...
متن کاملLightweight Security Mechanism for PSTN-IP Telephony Convergence
A new, lightweight security mechanism for the PSTN-VoIP hybrid networks is described. It is based on the two informationhiding techniques: audio watermarking and network steganography. The proposed scheme is suitable especially for the PSTN-IP-PSTN (toll-by-passing) scenario, which nowadays is a very popular application of the IP Telephony systems. Proposed mechanism can be used to authenticate...
متن کاملThe IETF Internet Telephony Architecture and Protocols
Internet telephony was first used as a simple way to provide point-to-point voice transport between two IP hosts. However, the growing interest in providing integrated voice, data, and video services has caused its scope to be expanded. Internet telephony now encompasses a range of services. These services include not only traditional conferencing, call control, multimedia, and mobility service...
متن کاملIntrusion Detection Systems for IP Telephony Networks
Intrusion detection systems (IDS) provide security for network systems. They are used in computer networks to detect violations against security policies or unusual events that could lead towards a security thread. Telephone networks based on the internet protocol (IP) called IP telephony (IPT) are a recent development in network usage and will become a common application in the next years as t...
متن کامل