مطالعات مدیریت کسب و کار هوشمند

نوع مقاله : مقاله پژوهشی

نویسندگان

1 عضو هیئت علمی، گروه فناوری اطلاعات، دانشگاه علوم انتظامی امین، تهران

2 کارشناس ارشد مدیریت فناوری اطلاعات، دانشگاه علوم انتظامی امین. (نویسنده مسئول)، ezaree1354@chmail.ir

چکیده

 
معماری شبکه‌‌ آی‌‌پی ازنقطه‌نظر امنیتی شکننده است و وُیپ نیز که از استانداردهای این شبکه‌ استفاده می‌‌کند با حملات متعدد مورد آسیب قرار می‌‌گیرد، حملاتی که کاهش کیفیت و در مواردی قطع خدمات و اتلاف منابع وُیپ را به دنبال دارد. در این راستا تأمین امنیت وُیپ امری ضروری است و به‌طورمعمول اعمال راهکارهای امنیتی در سامانه‌‌ها ازجمله وُیپ موجب کندی و کاهش کیفیت عملکرد و افزایش هزینه‌های راه‌‌اندازی و نگهداشت می‌‌شود؛ بنابراین مدیران فناوری اطلاعات می‌‌بایست راهکارهای امنیتی با درجه‌ی اولویت بالا را ‌‌مدنظر قرار دهند. برای این کار با مرور ادبیات تحقیق، ماتریس جامع امنیت وُیپ مشتمل بر فهرست جامعی از چالش‌‌های امنیتی وُیپ و راهکارهای مقابله استخراج گردید که کمک بسزایی در هوشمندی و مدیریت ریسک سازمان‌ها می‌نماید. نتایج به‌دست‌آمده در این مقاله نشان داد که انجام سه راهکار «جداسازی VLAN­های ترافیک صوت و داده»، «احراز هویت سیگنالینگ» و «احراز هویت درگاه» بیشترین تأثیر مثبت را بر امنیت وُیپ دانشگاه علوم انتظامی خواهد داشت. نتایج حاصل با توصیه‌ها و راهکارهای مقابله امنیتی ذکرشده توسط تحقیقات قبلی و مؤسسات معتبر امنیتی کاملاً مطابق و هم‌‌راستا است و فقط اولویت‌‌های پیشنهادی جابجا شده است. لذا در برنامه‌های راهبردی فناوری اطلاعات سازمان و تصمیم‌گیری و نظارت مدیران فناوری اطلاعات سه راهکار مذکور می‌بایست در اولویت به‌کارگیری وُیپ لحاظ گردد.
 

کلیدواژه‌ها

عنوان مقاله [English]

Analysis and Prioritization of VoIP Security Challenges

نویسندگان [English]

  • Saeid Bakhtiari 1
  • Esmaeil Zareh 2

1 Faculty Member, Department of Information Technology, Amin Police University,

2 MA, Information Technology Management, Amin Police University, Tehran (Corresponding Author: ezaree1354@chmail.ir).

چکیده [English]

P network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and typically the implementation of security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-security security solutions. To do this, by reviewing the research literature, VoIP comprehensive security matrix has been extracted from a comprehensive list of VoIP security challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP security. The results are consistent with the recommendations and security countermeasures mentioned by previous research and security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP applicationIP network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and typically the implementation of security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-security security solutions. To do this, by reviewing the research literature, VoIP comprehensive security matrix has been extracted from a comprehensive list of VoIP security challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP security. The results are consistent with the recommendations and security countermeasures mentioned by previous research and security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP application

کلیدواژه‌ها [English]

  • VoIP
  • Security
  • Challenge
  • Countermeasure
سعدآبادی. ع، امیرشاهی. ب، (1395)، تشخیص حملات انکار سرویس ‌توزیع‌شده با استفاده از سیستم خبره، فصلنامهمطالعاتمدیریتفناوریاطلاعات، سال پنجم، شماره 17، 63-92
Aziz, A. Hoffstadt, D. Rathgeb, E. & Dreibholz, T. (2014, 2-4 June 2014). A distributed infrastructure to analyse SIP attacks in the Internet. Paper presented at the 2014 IFIP Networking Conference.
Butcher, D. Li, X. & Guo, J. (2007). Security Challenge and Defense in VoIP Infrastructures. IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews).
Chiappetta, S. Mazzariello, C. Presta, R. & Romano, S. P. (2013). An anomaly-based approach to the analysis of the social behavior of VoIP users. Computer Networks, 57(6), 1545-1559.
Coulibaly, E. & Liu, L. H. (2010). Security Of VoIP Networks.
Ding, Y. & Horster, P. (1995). Undetectable On-line Password Guessing Attacks.
Farley, R. & Wang, X. (2014). Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation. International Journal of Critical Infrastructure Protection.
Ghafarian, A. Seno, S. A. H. & Dehghani, M. (2016). An Empirical Study of Security of VoIP System.
Hosseinpour, M. Hosseini Seno, S. A. Yaghmaee Moghaddam, M. H. & Khosravi roshkhari, H. (2016). Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic.
Hussain, M. Gupta, P. Bano, S. & Kulkarni, V. (2016). High-Performance and Cost-Effective VoIP Security Techniques for Operations on IPv4, IPv6, and IPv4IPv6 Networks.
Keromytis, A. D. (2012). A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials.
Lutiis, P. D. & Lombardo, D. (2009, 26-29 Oct. 2009). An innovative way to analyze large ISP data for IMS security and monitoring. Paper presented at the 2009 13th International Conference on Intelligence in Next Generation Networks.
Manunza, L. Marseglia, S. & Romano, S. P. (2017). Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. Journal of Network and Computer Applications.
Pecori, R. & Veltri, L. (2016). 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications. Computer Communications.
Perez-Botero, D. & Donoso, Y. (2011). VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures.
Phithakkitnukoon, S. Dantu, R. & Baatarjav, E.A. (2008). VoIP Security — Attacks and Solutions. Information Security Journal: A Global Perspective.
Shan, L. & Jiang, N. (2009). Research on Security Mechanisms of SIP-Based VoIP System. Paper presented at the 2009 Ninth International Conference on Hybrid Intelligent Systems.
Sonwane, G. D. & Chandavarkar, B. R. (2013). Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network. Paper presented at the 2013 2nd International Conference on Advanced Computing, Networking and Security.
Tsiatsikas, Z. Geneiatakis, D. Kambourakis, G. & Keromytis, A. D. (2015). An efficient and easily deployable method for dealing with DoS in SIP services. Computer Communications.
Vennila, G. & Manikandan, M. (2016). A Scalable Detection Technique for Real-time Transport Protocol (RTP) Flooding Attacks in VoIP Network. Procedia Computer Science.
Wallace, K. (2009). Cisco-Voice-over-IP-CVOICE.
Xin, J. (2007). Security Issues and Countermeasure for VoIP.
Zhang, L. Tang, S. & Zhu, S. (2016). An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications.
 
 
 
 
سعدآبادی. ع، امیرشاهی. ب، (1395)، تشخیص حملات انکار سرویس ‌توزیع‌شده با استفاده از سیستم خبره، فصلنامهمطالعاتمدیریتفناوریاطلاعات، سال پنجم، شماره 17، 63-92
Aziz, A. Hoffstadt, D. Rathgeb, E. & Dreibholz, T. (2014, 2-4 June 2014). A distributed infrastructure to analyse SIP attacks in the Internet. Paper presented at the 2014 IFIP Networking Conference.
Butcher, D. Li, X. & Guo, J. (2007). Security Challenge and Defense in VoIP Infrastructures. IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews).
Chiappetta, S. Mazzariello, C. Presta, R. & Romano, S. P. (2013). An anomaly-based approach to the analysis of the social behavior of VoIP users. Computer Networks, 57(6), 1545-1559.
Coulibaly, E. & Liu, L. H. (2010). Security Of VoIP Networks.
Ding, Y. & Horster, P. (1995). Undetectable On-line Password Guessing Attacks.
Farley, R. & Wang, X. (2014). Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation. International Journal of Critical Infrastructure Protection.
Ghafarian, A. Seno, S. A. H. & Dehghani, M. (2016). An Empirical Study of Security of VoIP System.
Hosseinpour, M. Hosseini Seno, S. A. Yaghmaee Moghaddam, M. H. & Khosravi roshkhari, H. (2016). Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic.
Hussain, M. Gupta, P. Bano, S. & Kulkarni, V. (2016). High-Performance and Cost-Effective VoIP Security Techniques for Operations on IPv4, IPv6, and IPv4IPv6 Networks.
Keromytis, A. D. (2012). A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials.
Lutiis, P. D. & Lombardo, D. (2009, 26-29 Oct. 2009). An innovative way to analyze large ISP data for IMS security and monitoring. Paper presented at the 2009 13th International Conference on Intelligence in Next Generation Networks.
Manunza, L. Marseglia, S. & Romano, S. P. (2017). Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. Journal of Network and Computer Applications.
Pecori, R. & Veltri, L. (2016). 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications. Computer Communications.
Perez-Botero, D. & Donoso, Y. (2011). VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures.
Phithakkitnukoon, S. Dantu, R. & Baatarjav, E.A. (2008). VoIP Security — Attacks and Solutions. Information Security Journal: A Global Perspective.
Shan, L. & Jiang, N. (2009). Research on Security Mechanisms of SIP-Based VoIP System. Paper presented at the 2009 Ninth International Conference on Hybrid Intelligent Systems.
Sonwane, G. D. & Chandavarkar, B. R. (2013). Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network. Paper presented at the 2013 2nd International Conference on Advanced Computing, Networking and Security.
Tsiatsikas, Z. Geneiatakis, D. Kambourakis, G. & Keromytis, A. D. (2015). An efficient and easily deployable method for dealing with DoS in SIP services. Computer Communications.
Vennila, G. & Manikandan, M. (2016). A Scalable Detection Technique for Real-time Transport Protocol (RTP) Flooding Attacks in VoIP Network. Procedia Computer Science.
Wallace, K. (2009). Cisco-Voice-over-IP-CVOICE.
Xin, J. (2007). Security Issues and Countermeasure for VoIP.
Zhang, L. Tang, S. & Zhu, S. (2016). An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications.
 
 
 
 v
سعدآبادی. ع، امیرشاهی. ب، (1395)، تشخیص حملات انکار سرویس ‌توزیع‌شده با استفاده از سیستم خبره، فصلنامهمطالعاتمدیریتفناوریاطلاعات، سال پنجم، شماره 17، 63-92
Aziz, A. Hoffstadt, D. Rathgeb, E. & Dreibholz, T. (2014, 2-4 June 2014). A distributed infrastructure to analyse SIP attacks in the Internet. Paper presented at the 2014 IFIP Networking Conference.
Butcher, D. Li, X. & Guo, J. (2007). Security Challenge and Defense in VoIP Infrastructures. IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews).
Chiappetta, S. Mazzariello, C. Presta, R. & Romano, S. P. (2013). An anomaly-based approach to the analysis of the social behavior of VoIP users. Computer Networks, 57(6), 1545-1559.
Coulibaly, E. & Liu, L. H. (2010). Security Of VoIP Networks.
Ding, Y. & Horster, P. (1995). Undetectable On-line Password Guessing Attacks.
Farley, R. & Wang, X. (2014). Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation. International Journal of Critical Infrastructure Protection.
Ghafarian, A. Seno, S. A. H. & Dehghani, M. (2016). An Empirical Study of Security of VoIP System.
Hosseinpour, M. Hosseini Seno, S. A. Yaghmaee Moghaddam, M. H. & Khosravi roshkhari, H. (2016). Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic.
Hussain, M. Gupta, P. Bano, S. & Kulkarni, V. (2016). High-Performance and Cost-Effective VoIP Security Techniques for Operations on IPv4, IPv6, and IPv4IPv6 Networks.
Keromytis, A. D. (2012). A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials.
Lutiis, P. D. & Lombardo, D. (2009, 26-29 Oct. 2009). An innovative way to analyze large ISP data for IMS security and monitoring. Paper presented at the 2009 13th International Conference on Intelligence in Next Generation Networks.
Manunza, L. Marseglia, S. & Romano, S. P. (2017). Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. Journal of Network and Computer Applications.
Pecori, R. & Veltri, L. (2016). 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications. Computer Communications.
Perez-Botero, D. & Donoso, Y. (2011). VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures.
Phithakkitnukoon, S. Dantu, R. & Baatarjav, E.A. (2008). VoIP Security — Attacks and Solutions. Information Security Journal: A Global Perspective.
Shan, L. & Jiang, N. (2009). Research on Security Mechanisms of SIP-Based VoIP System. Paper presented at the 2009 Ninth International Conference on Hybrid Intelligent Systems.
Sonwane, G. D. & Chandavarkar, B. R. (2013). Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network. Paper presented at the 2013 2nd International Conference on Advanced Computing, Networking and Security.
Tsiatsikas, Z. Geneiatakis, D. Kambourakis, G. & Keromytis, A. D. (2015). An efficient and easily deployable method for dealing with DoS in SIP services. Computer Communications.
Vennila, G. & Manikandan, M. (2016). A Scalable Detection Technique for Real-time Transport Protocol (RTP) Flooding Attacks in VoIP Network. Procedia Computer Science.
Wallace, K. (2009). Cisco-Voice-over-IP-CVOICE.
Xin, J. (2007). Security Issues and Countermeasure for VoIP.
Zhang, L. Tang, S. & Zhu, S. (2016). An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications.
 
 
 
 
سعدآبادی. ع، امیرشاهی. ب، (1395)، تشخیص حملات انکار سرویس ‌توزیع‌شده با استفاده از سیستم خبره، فصلنامهمطالعاتمدیریتفناوریاطلاعات، سال پنجم، شماره 17، 63-92
Aziz, A. Hoffstadt, D. Rathgeb, E. & Dreibholz, T. (2014, 2-4 June 2014). A distributed infrastructure to analyse SIP attacks in the Internet. Paper presented at the 2014 IFIP Networking Conference.
Butcher, D. Li, X. & Guo, J. (2007). Security Challenge and Defense in VoIP Infrastructures. IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews).
Chiappetta, S. Mazzariello, C. Presta, R. & Romano, S. P. (2013). An anomaly-based approach to the analysis of the social behavior of VoIP users. Computer Networks, 57(6), 1545-1559.
Coulibaly, E. & Liu, L. H. (2010). Security Of VoIP Networks.
Ding, Y. & Horster, P. (1995). Undetectable On-line Password Guessing Attacks.
Farley, R. & Wang, X. (2014). Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation. International Journal of Critical Infrastructure Protection.
Ghafarian, A. Seno, S. A. H. & Dehghani, M. (2016). An Empirical Study of Security of VoIP System.
Hosseinpour, M. Hosseini Seno, S. A. Yaghmaee Moghaddam, M. H. & Khosravi roshkhari, H. (2016). Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic.
Hussain, M. Gupta, P. Bano, S. & Kulkarni, V. (2016). High-Performance and Cost-Effective VoIP Security Techniques for Operations on IPv4, IPv6, and IPv4IPv6 Networks.
Keromytis, A. D. (2012). A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials.
Lutiis, P. D. & Lombardo, D. (2009, 26-29 Oct. 2009). An innovative way to analyze large ISP data for IMS security and monitoring. Paper presented at the 2009 13th International Conference on Intelligence in Next Generation Networks.
Manunza, L. Marseglia, S. & Romano, S. P. (2017). Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. Journal of Network and Computer Applications.
Pecori, R. & Veltri, L. (2016). 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications. Computer Communications.
Perez-Botero, D. & Donoso, Y. (2011). VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures.
Phithakkitnukoon, S. Dantu, R. & Baatarjav, E.A. (2008). VoIP Security — Attacks and Solutions. Information Security Journal: A Global Perspective.
Shan, L. & Jiang, N. (2009). Research on Security Mechanisms of SIP-Based VoIP System. Paper presented at the 2009 Ninth International Conference on Hybrid Intelligent Systems.
Sonwane, G. D. & Chandavarkar, B. R. (2013). Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network. Paper presented at the 2013 2nd International Conference on Advanced Computing, Networking and Security.
Tsiatsikas, Z. Geneiatakis, D. Kambourakis, G. & Keromytis, A. D. (2015). An efficient and easily deployable method for dealing with DoS in SIP services. Computer Communications.
Vennila, G. & Manikandan, M. (2016). A Scalable Detection Technique for Real-time Transport Protocol (RTP) Flooding Attacks in VoIP Network. Procedia Computer Science.
Wallace, K. (2009). Cisco-Voice-over-IP-CVOICE.
Xin, J. (2007). Security Issues and Countermeasure for VoIP.
Zhang, L. Tang, S. & Zhu, S. (2016). An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications.
 
 
 
 
سعدآبادی. ع، امیرشاهی. ب، (1395)، تشخیص حملات انکار سرویس ‌توزیع‌شده با استفاده از سیستم خبره، فصلنامهمطالعاتمدیریتفناوریاطلاعات، سال پنجم، شماره 17، 63-92
Aziz, A. Hoffstadt, D. Rathgeb, E. & Dreibholz, T. (2014, 2-4 June 2014). A distributed infrastructure to analyse SIP attacks in the Internet. Paper presented at the 2014 IFIP Networking Conference.
Butcher, D. Li, X. & Guo, J. (2007). Security Challenge and Defense in VoIP Infrastructures. IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews).
Chiappetta, S. Mazzariello, C. Presta, R. & Romano, S. P. (2013). An anomaly-based approach to the analysis of the social behavior of VoIP users. Computer Networks, 57(6), 1545-1559.
Coulibaly, E. & Liu, L. H. (2010). Security Of VoIP Networks.
Ding, Y. & Horster, P. (1995). Undetectable On-line Password Guessing Attacks.
Farley, R. & Wang, X. (2014). Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation. International Journal of Critical Infrastructure Protection.
Ghafarian, A. Seno, S. A. H. & Dehghani, M. (2016). An Empirical Study of Security of VoIP System.
Hosseinpour, M. Hosseini Seno, S. A. Yaghmaee Moghaddam, M. H. & Khosravi roshkhari, H. (2016). Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic.
Hussain, M. Gupta, P. Bano, S. & Kulkarni, V. (2016). High-Performance and Cost-Effective VoIP Security Techniques for Operations on IPv4, IPv6, and IPv4IPv6 Networks.
Keromytis, A. D. (2012). A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials.
Lutiis, P. D. & Lombardo, D. (2009, 26-29 Oct. 2009). An innovative way to analyze large ISP data for IMS security and monitoring. Paper presented at the 2009 13th International Conference on Intelligence in Next Generation Networks.
Manunza, L. Marseglia, S. & Romano, S. P. (2017). Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks. Journal of Network and Computer Applications.
Pecori, R. & Veltri, L. (2016). 3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications. Computer Communications.
Perez-Botero, D. & Donoso, Y. (2011). VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures.
Phithakkitnukoon, S. Dantu, R. & Baatarjav, E.A. (2008). VoIP Security — Attacks and Solutions. Information Security Journal: A Global Perspective.
Shan, L. & Jiang, N. (2009). Research on Security Mechanisms of SIP-Based VoIP System. Paper presented at the 2009 Ninth International Conference on Hybrid Intelligent Systems.
Sonwane, G. D. & Chandavarkar, B. R. (2013). Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network. Paper presented at the 2013 2nd International Conference on Advanced Computing, Networking and Security.
Tsiatsikas, Z. Geneiatakis, D. Kambourakis, G. & Keromytis, A. D. (2015). An efficient and easily deployable method for dealing with DoS in SIP services. Computer Communications.
Vennila, G. & Manikandan, M. (2016). A Scalable Detection Technique for Real-time Transport Protocol (RTP) Flooding Attacks in VoIP Network. Procedia Computer Science.
Wallace, K. (2009). Cisco-Voice-over-IP-CVOICE.
Xin, J. (2007). Security Issues and Countermeasure for VoIP.
Zhang, L. Tang, S. & Zhu, S. (2016). An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications.