Detecting trustworthy real-time communications using a web-of-trust

    GLOBECOM, pp. 1387-1394, 2009.

    Cited by: 10|Bibtex|Views5|Links
    EI WOS
    Keywords:
    Internet telephonycryptographic protocolssignalling protocolstelecommunication securityVoIP attacksMore(6+)

    Abstract:

    Voice-over-IP protocols (e.g., SIP) are vulnerable to many types of attacks. One core challenge in preventing VoIP attacks is to assess the trustworthiness of the caller's identity. Further, spoofing attacks must be prevented by verifying that the call has been initiated by the user belonging to the caller's identity. In this paper, we pr...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments