The VoIP Security Analysis and Tools in uLaw and GSM Protocol

IGN MANTRA, Teguh Prasetyo Mulyo

Abstract


Web-based software development The VoIP technology allows users to be able to communicate on the Internet Protocol (IP) network with each other more efficiently, but VoIP technology has a weakness in information security. Security of the intended information is the security of user conversations that can be recorded by irresponsible parties. The Aspect of integrity, VoIP security system can be seen from the side of users, the original sound quality of voice conversation. The aspect availability, sound is not lost when transmitted or shipping and the aspect of confidentiality, voice must be secured either encrypted or disguised, so it is not known with certainty what sounds and who is talking. This paper is testing and analysis the VoIP, secure or nosecure and sound quality on the open source platform. One of any methods that can be used is using VPN, the security method VPN is to create tunneling or create a special path between users of the service with the server, to ensure the data sent by the user to the destination without any intruders that take or change the data conversation and encryption at the time of sending data as well as decrypting on data recipient. There are not many communication protocols used in Indonesia, the selection of uLaw and GSM as research objects because GSM has become the main protocol used, while ulaw as a comparison other than GSM. These two protocols can be obtained the conclusion that GSM and uLaw as an address secure tools in the implementation of VoIP security in Indonesia telecommunication.


Keywords


Technology

Full Text:

PDF

References


Ahmad Setiawan, Fikri.. Analisa perbandingan kualitas VoIP menggunakan codec G.711 dan GSM dengan menggunakan metode fast handover pada mobile IPv6 (FMIPv6). Universitas Indonesia. 2012.

DC Sicker, Tom Lookabaugh, VoIP Security : Not an afterthought, 2004, dl.acm.org

Feilner, Markus. Gaft, Norbert. Beginning OpenVPN 2.0.9. Packt Publishing. 2012.

Hartpence, Bruce. Packet Guide to Voice over IP. O’REILLY. 2013.

Hung, Patrick C.K, Martin, Miguel Vargas, Security Issues in VOIP Applications, Electrical and Computer Engineering, 2006. CCECE ’06.

Likhar, Praveen. Shankar, Ravi. Rao M, Keshava. Securing IEEE 802.11g WLAN using OpenVPN and its Impact Analysis. 2011.

S McGann, DC Sicker, An analysis of security threats and tools in SIP-based VoIP systems, Second VoIP security workshop, 2005-startrinity.com

Sugeng, Einarno. Istiyanto, Jazi Eko. Mustofa, Khabib. Ashari, Ahmad. The Impact of QoS Changes towards Network Performance. 2015.

Uskov, Alexander. Byerly, Adam. Heinemann, Colleen. Advance encryption standard analysis with multimedia data on intel ® AES-NI architecture. 2016.




DOI: http://dx.doi.org/10.52155/ijpsat.v9.2.528

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 IGN MANTRA

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.