Evaluation of VoIP Security for Mobile Devices

Market research reports by In-Stat, Gartner, and the Swedish Post and Telecom Agency (PTS) reveal a growing worldwide demand for Voice over IP (VoIP) and smartphones. This trend is expected to cont ...

[1]  Erik Eliasson Secure Internet telephony : design, implementation and performance measurements , 2006 .

[2]  Mats Näslund,et al.  The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.

[3]  Dan Wing,et al.  Session Description Protocol (SDP) Security Descriptions for Media Streams , 2006, RFC.

[4]  Jon Callas,et al.  ZRTP: Media Path Key Agreement for Unicast Secure RTP , 2011, RFC.

[5]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[6]  Jon Postel,et al.  User Datagram Protocol , 1980, RFC.

[7]  Romanidis Evripidis Lawful Interception and Countermeasures : In the era of Internet Telephony , 2008 .

[8]  Eric Rescorla,et al.  Framework for Establishing a Secure Real-time Transport Protocol (SRTP) Security Context Using Datagram Transport Layer Security (DTLS) , 2010, RFC.

[9]  Glen Zorn,et al.  IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines , 2003, RFC.

[10]  Stephen E. Deering,et al.  Path MTU discovery , 1990, RFC.

[11]  Johan Bilien Key Agreement for Secure Voice over IP , 2003 .

[12]  Jari Arkko,et al.  Key Management Extensions for Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP) , 2006, RFC.

[13]  Hiroshi Inamura,et al.  TCP over Second (2.5G) and Third (3G) Generation Wireless Networks , 2003, RFC.

[14]  Alexander L. Wijesinha,et al.  An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP , 2009, 2009 Third International Conference on Network and System Security.

[15]  Henning Schulzrinne,et al.  Introduction to IMS , 2009 .

[16]  Jari Arkko,et al.  Diameter Base Protocol , 2003, RFC.

[17]  Erik Eliasson Secure VoIP performance on handheld devices , 2006 .

[18]  Tian Tian,et al.  MIKEY-TICKET: Ticket-Based Modes of Key Distribution in Multimedia Internet KEYing (MIKEY) , 2011, RFC.

[19]  Jonathan Knudsen,et al.  Beginning J2me: From Novice To Professional (Beginning from Novice to Professional) , 2005 .

[20]  Erik Eliasson,et al.  Call establishment delay for secure VoIP , 2004 .

[21]  Henning Schulzrinne,et al.  RTP Profile for Audio and Video Conferences with Minimal Control , 2003, RFC.

[22]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[23]  Jari Arkko,et al.  Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) , 2002, RFC.

[24]  Johan Bilien,et al.  Secure VoIP : call establishment and media protection , 2005 .

[25]  Tomas Joelsson Mobile Web Browser Extensions : Utilizing local device functionality in mobile web applications , 2008 .

[26]  Jon Peterson,et al.  Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP) , 2006, RFC.

[27]  Jari Arkko,et al.  MIKEY: Multimedia Internet KEYing , 2004, RFC.

[28]  Eric Rescorla,et al.  Datagram Transport Layer Security , 2006, RFC.

[29]  Henning Schulzrinne,et al.  Reliability of Provisional Responses in Session Initiation Protocol (SIP) , 2002, RFC.

[30]  Eric Rescorla,et al.  Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP) , 2010, RFC.

[31]  Christian Huitema,et al.  Media Gateway Control Protocol (MGCP) Version 1.0 , 1999, RFC.

[32]  Simon Josefsson,et al.  The Base16, Base32, and Base64 Data Encodings , 2003, RFC.

[33]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[34]  Elizabeth Chang,et al.  Secure mobile VoIP , 2007 .

[35]  Mark Handley,et al.  SDP: Session Description Protocol , 1998, RFC.