Detecting trustworthy real-time communications using a web-of-trust
GLOBECOM, pp. 1387-1394, 2009.
Internet telephonycryptographic protocolssignalling protocolstelecommunication securityVoIP attacksMore(6+)
Voice-over-IP protocols (e.g., SIP) are vulnerable to many types of attacks. One core challenge in preventing VoIP attacks is to assess the trustworthiness of the caller's identity. Further, spoofing attacks must be prevented by verifying that the call has been initiated by the user belonging to the caller's identity. In this paper, we pr...More
Full Text (Upload PDF)
PPT (Upload PPT)