PostHeaderIcon

Security issiues in VOIP Applications

The IPsec header and the new IP Header for this encapsulating packet are the only information left in the clear. Usually each “tunnel” is between two network elements such as a router or a gateway..   The IP addresses of these nodes are used as the unencrypted IP address at each hop. Hence, at no point is a plain IP header sent out containing both the source and destination IP. Thus if an attacker were to intercept such packets, they would be unable to discern the packet contents or the origin and destination. Note that some traffic analysis is possible even in tunnel mode, because gateway addresses are readable. If a gateway is used exclusively by a particular organization, an attacker can determine the identity of one or both communicating organizations from the gateway addresses. IPsec allows nodes in the network to negotiate not only a security policy, which defines the security protocol and transport mode as described previously, but also a security association defining the encryption algorithm.  Security mechanisms for VOIP   The prominent security mechanisms used along with voice traffic include virtual private networks (VPN), end-to-end encryption and address translation.   Virtual private networks are one of the basic forms of security mechanisms. Here, the communicating parties establish a sort of association with each other using tunnels & the end points are connected through layer 2 techniques like Frame-Relay, ATM or MPLS.   With the end-to-end encryption, communicating entities initially exchange a secret key pair which they will be using to encrypt the data.

Pages: 1 2 3 4 5 6 [7] 8 9 10 11 12 13 14


Add comment:
Name:
Sait link: http://
Your message:
Enter today\\\\'s date, 2 digits
(spam protection):
 



News

Wharton Business Foundation - Authors Articles - ArticlesBase.com

Wharton Business Foundation is one of the foremost respected consulting firms helping companies to grow their business to the next level and beyond. With clients spanning across the nation as well as around the globe, our name has become synonymous with cutting edge expertise and timely intelligence. Though many of our clients know us for our business building experience and marketing and sales training expertise, we are quickly becoming known as the Premier Outsourcing Firm in the continental United States.



Popular

Is there a Certain Degree of Risk involve with Lasik Surgery Complications

Eye Laser Surgery is growing in appreciation and among many folks is the first choice to fix poor vision. But though it sometimes has a high success rate the result is often not as the patient intended and issues can arise. This is not always the fault of the surgeon or LASIK consultant. It's common data that any medical process carries a certain degree of risk and before starting on any treatment you should usually res.



New!

How Does the LAP-BAND® Procedure Work?

How Does the LAP-BAND® Procedure Work?Author: Erich ShreflerThe LAP-BAND® procedure, or laparoscopic adjustable gastric banding surgery, is the second most common weight loss surgery performed in the U.S., second only to gastric bypass surgery. Compared to gastric bypass, LAP-BAND® surgery is considered less extreme and minimally invasive because: Surgical incisions are small. There is no rerouting of the digestive system and no change in the way calories are absorbed by the body.