Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of Secure VoIP
A Research work
Applied Science University
Faculty of Information Technology
Graduation Projects Report
A Research work
Secure voice over internet protocol (VoIP)
Mahmoud Awwad 200910472
Ibrahim Al- Surmi 200910858
Dr. Ahmad Al-Omari
Chapter 1: introduction 1.1 Introduction
We know that our community needs to keep pace with new technology and the evolution of our current world. So we decide to research a new project about secure voice over internet protocol (VoIP) that helps us to connect people through the internet in secure and safe way to provide privacy considering the speed and other Quality of service.
Our project is about making comparison between the protocols and chooses the best one that provides privacy and security and other quality of service (QoS).
1.3 Problem Statement In VoIP there is some concern of security whenever data is transmitted over an open network.
Since cryptography plays a major role in maintaining the security of data but new method should be used with (VoIP) system to minimize delay.
This technology faces some challenges such as latency, packet loss, and security, etc.
The major problem is the delay overload that comes from encryption/ decryption processes.
1.4 Problems Solution The solution of the related research problems, we are worked by a good ways.
We are making comparison between the security protocols and choose the best one that provides the speed and minimized the delay.
We'll explain the method work of each protocol separately and find the advantages and disadvantages.
1.5Project Objectives To find the best way to communicate and have it with speed and privacy at the same time.
To find the best way to encrypt the data that match with VoIP system and does not affect the speed
To find the difference between the protocols In terms of efficiency to choose the best
To evaluate the best secure protocol
To compare the overhead of secure connection over non secure
Copyright © 2013 Applied Science University. All rights are reserved. 1.2 Description
In the beginning we are going to use the open source “Asterisk” to construct two parties “client/server” then establishing a connection between them, without using any secure protocol. To find the difference between secure and unsecure connection.
As so as we must use many different protocols to secure the connection.
We are making comparison between the protocols and choose the best one that provides privacy and security and other quality of service.
The protocols must consider the speed and reliability for the connection and other services to keep the connection secure and private and fast.
1.6 Technology and Tools Used Ubuntu 12.
VMware workstation 8.
Asterisk server Open source.
And other security protocols.
Microsoft project management tool
1.7 Functional Requirements The user should be able to choose the fastest connection based on the type of service automatically
The user can alternate between different type of security protocols based on the required level of security for the connection
The user should be able to use the connection in seamless way, based on the Quality of Service QoS, regardless of the type of connection
The user can manually choose the security protocol, regardless of the proposed secure protocol
1.8 Project Limitations The system may suffer from bad usage by the user, (not choosing the right protocol for the right service, this may shows degradation in protocol performance)
The ISP may not allow a specific type of secure connection
The Firewall may disable the secure connection
The device that is using the protocol might not be efficient enough to support the protocol
Users may not be familiar with basic security requirements, like key distribution and registration