Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Secure VoIP

Graduation project (1)
by

Mahmoud Awwad

on 11 January 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Secure VoIP

photo credit Nasa / Goddard Space Flight Center / Reto Stöckli Secure VoIP Graduation Projects Report
A Research work
Applied Science University
Faculty of Information Technology
Graduation Projects Report
A Research work
Secure voice over internet protocol (VoIP)

Prepared by:
Mahmoud Awwad 200910472
Ibrahim Al- Surmi 200910858

Supervised by:
Dr. Ahmad Al-Omari
Chapter 1: introduction 1.1 Introduction
 We know that our community needs to keep pace with new technology and the evolution of our current world. So we decide to research a new project about secure voice over internet protocol (VoIP) that helps us to connect people through the internet in secure and safe way to provide privacy considering the speed and other Quality of service.
Our project is about making comparison between the protocols and chooses the best one that provides privacy and security and other quality of service (QoS).

1.3 Problem Statement In VoIP there is some concern of security whenever data is transmitted over an open network.
Since cryptography plays a major role in maintaining the security of data but new method should be used with (VoIP) system to minimize delay.
This technology faces some challenges such as latency, packet loss, and security, etc.
The major problem is the delay overload that comes from encryption/ decryption processes.
1.4 Problems Solution The solution of the related research problems, we are worked by a good ways.

We are making comparison between the security protocols and choose the best one that provides the speed and minimized the delay.

We'll explain the method work of each protocol separately and find the advantages and disadvantages.
1.5Project Objectives To find the best way to communicate and have it with speed and privacy at the same time.

To find the best way to encrypt the data that match with VoIP system and does not affect the speed

To find the difference between the protocols In terms of efficiency to choose the best

To evaluate the best secure protocol

To compare the overhead of secure connection over non secure
Copyright © 2013 Applied Science University. All rights are reserved. 1.2 Description
In the beginning we are going to use the open source “Asterisk” to construct two parties “client/server” then establishing a connection between them, without using any secure protocol. To find the difference between secure and unsecure connection.
As so as we must use many different protocols to secure the connection.
We are making comparison between the protocols and choose the best one that provides privacy and security and other quality of service.
The protocols must consider the speed and reliability for the connection and other services to keep the connection secure and private and fast.
1.6 Technology and Tools Used Ubuntu 12.
VMware workstation 8.
Asterisk server Open source.
IPsec protocol.
SSL protocol.
TlS protocol.
And other security protocols.
Microsoft Visio
Microsoft project management tool
Rational rose
1.7 Functional Requirements The user should be able to choose the fastest connection based on the type of service automatically
The user can alternate between different type of security protocols based on the required level of security for the connection
The user should be able to use the connection in seamless way, based on the Quality of Service QoS, regardless of the type of connection
The user can manually choose the security protocol, regardless of the proposed secure protocol
1.8 Project Limitations The system may suffer from bad usage by the user, (not choosing the right protocol for the right service, this may shows degradation in protocol performance)
The ISP may not allow a specific type of secure connection
The Firewall may disable the secure connection
The device that is using the protocol might not be efficient enough to support the protocol
Users may not be familiar with basic security requirements, like key distribution and registration
http://www.asterisk.org/
http://www.prezi.com
EARS
Full transcript