Secure VoIP. Outline Who? CUBE Members Why? Motivation What? Project Description How? Design and Implementation.

Slides:



Advertisements
Similar presentations
The Easy Way to Call Landlines, Cell Phones, Video Chat or IM from Computer to Computer. Conference calls and voic too.
Advertisements

Broadband and Wide Area Network Services Carrier Gigabit Ethernet Multi Protocol Label Switching Vs. IP VPNs T-1 & T-3 SIP Trunks Security Network Topology.
Voxiplus.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
24/08/2005 IP Telephony1 Guided by: Presented by: Dr.S.K.Ghosh Nitesh Jain 05IT6008 M.Tech 1 st year.
A Survey of Netergy Networks Hung, Kuo-EnNTHU/CS, Visual Communication Lab.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Magic Jack Magic Jack is a computer attachment that, in combination with telephone service from the related YMAX Corporation, provides internet-based.
VoIP with the Asterisk PBX Mike Gerschefske Justin Gray James Yoo.
Voice Over Internet Protocol “VoIP” Muayyed Al Kadhem Abdulkhaleq Al Musaleem.
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
By: Christopher Henderson.  What is VoIP?  How is it being used?  VoIP’s main Security Threats.  Availability of Service  Integrity of Service 
VOIP ENGR 475 – Telecommunications Harding University November 16, 2006 Jonathan White.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
 CHAPTER 2  Understanding the Pieces of Cisco Unified Communication.
Asterisk based web real time communication Advisor : Lian-Jou Tsai Student : Jhe-Yu Wu.
Web2forDev Learning Opportunity [venue], [date] CTA is an ACP-EU institution working in the field of information for development. It operates under the.
Presenters :Deepak Yadav Voice Over Internet Protocol.
Hardware.  Learn what hardware is  Learn different input and output devices  Learn what the CPU is.
PROJECT TITLE Setting up an autodial system that auto dials numbers and plays a recorded message when receiver picks up. GROUP MEMBERS Anusha Aligapally.
Delivering Voice, Video, Data & Mobility to SMBs.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
VoIP Voice over Internet Protocol
VoIP Study and Implementation VoIP Ecosystem and Strategy Version 1.0 – Author : Marc PYBOURDIN / Julien BERTON Last Update : 15/05/2012.
VoIP Citizen Decreasing Cost For Communication Voice over Internet Protocol Implement VoIP on your office Bona Simanjuntak, Mei 2004
Using Skype. Overview What is it? –Skype is a software based VOIP application and network. What is VOIP? –VOIP = Voice Over Internet Protocol.
Copyrights © All rights Reserved. Asterisk and VoIP issues Chetan Vaity March 2007.
Basics of IP Telephony Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
VoIP, Asterisk, and Java Michael P. Plezbert Agilis Systems, Inc St. Louis Java Users Group April 13, 2006.
VoIP Voice over Internet Protocol H.323 SIP RTP SDP IAX SRTP Skype And a lot more…
MAEDS 45 th Annual Conference October , 2009.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 BBTelsys and Secure SIP Calling Providing Solutions that Work in the Real World.
By Will Peeden.  Voice over Internet Protocol  A way to make phone calls over the internet.  A way to bypass the standard phone company and their charges.
P2P VoIP Speaker : Ching Chen Chang Date: 2007/09/27.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 3 – VoIP: An Overview.
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
Asterisk based web real time communication Advisor : Lian-Jou Tsai Student : Jhe-Yu Wu.
Voice over IP Are we there yet ? Presented by: Mark Caswell, Empire Technologies, LLC. Voice over IP.
NuolSec VIspace Vientiane, Laos.
Implement An Online Management System for PBX Presented by: Bui Phuong Nhung Advisor: Dr. Wei, Chao-Huang.
Private Branch Exchange(PBX) System wish Asterisk Advisor : Lian-Jou Tsai Student : Yi-Ting Lin.
Honours Project SIP / H.323 / AIX telephone customization.
Reference Case: Allied Law Solution. Internet Allied Law Premise PSTN – “legacy phone company” Calls in/out Audio conferencing T1 or PRI Phone System.
Voice Over Internet Protocol Applications and Interfaces.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Why need IP telephony? Economic (uses internet, IP routers...) Basic packages run around 10-15$ and don’t include national long distance calling Traditional.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 1 – Introduction to VoIP.
Voice over Internet Protocol Presenter: Devesh Patidar Arunjay Singh August 2, 2009.
Communication Methods
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 11 – VoIP Hardware.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Session Initiation Protocol
 Problematic: Transfer of messages from one server to another. A user is never in direct contact with this server must use an client which.
Presented by Maria Shah. Road Map  VoIP Benefits  VoIP Protocols  VoIP Analysis  Advantages  Disadvantages  Implementing  Security  Summary.
VoIP Server Software Comparison of Top VoIP Server Software.
HOW TO GUIDE: INEXPENSIVE INTERNET PROTOCOL TELEPHONY SOLUTION Created by: Cameron Adkisson Eastern Kentucky University
The World Leader in High Performance Signal Processing Solutions IP-PBX introduction Jerry Zeng Blackfin uClinux Team.
Rohde & Schwarz Topex VoxiPlus Advanced July 2011.
The face of the worlds #1 open source PBX software. Presenting FreePBX. By Eric Ashton.
On-Site PBX Vs Hosted PBX.
By Asma Hamad Alharbi.
PABX Telecommunication System Suppliers in UAE
Introduction to Networking
VoIP—Voice over Internet Protocol
ENGR 475 – Telecommunications
Presentation transcript:

Secure VoIP

Outline Who? CUBE Members Why? Motivation What? Project Description How? Design and Implementation

Outline Who? CUBE Members Why? Motivation What? Project Description How? Design and Implementation

CUBE Hakan Nizamoğlu Yiğitalp Ertem Saim Güveloğlu Murat Toprak

Outline Who? CUBE Members Why? Motivation What? Project Description How? Design and Implementation

Costs Same operator fee : 0.47 TL / min Other operators : 0.64 TL / min Turk Telekom : 0.60 TL / min Text message fee : 0.30 TL / message

Who is on the phone?

Security Problem of both telephony and internet communication. No solution for PSTNs or GSMs What are the problems on internet? Man-in-the-middle attack Administrator as Big Brother

Outline Who? CUBE Members Why? Motivation What? Project Description How? Design and Implementation

Project Description Secure VoIP VoIP stands for “Voice over Internet Protocol” Aims low cost and secure communication No extra cost other than internet fee Data can be encrypted Targets from companies, military, government to home users

VoIP Usage

VoIP with external device

Project Description Secure VoIP VoIP stands for “Voice over Internet Protocol” Aims low cost and secure communication No extra cost other than internet fee Data can be encrypted Targets from companies, military, government to home users

Project Description Secure VoIP VoIP stands for “Voice over Internet Protocol” Aims low cost and secure communication No extra cost other than internet fee Data can be encrypted Targets from companies, military, government to home users

Outline Who? CUBE Members Why? Motivation What? Project Description How? Design and Implementation

FPGA Board Input Device : Microphone Output Device : Speaker Single board computer Encryption on board CPU Data Transfer over Ethernet

Asterisk PBX Software Short for “private branch exchange” Bridge between endpoints Routs the data Open Source Telephony Project used by small businesses, large businesses, call centers, carriers and governments

Technologies JAVA Asterisk Embedded Linux Kernel 2.6 FPGA Board SIP / RTP / UDP Protocols

References ertarifeler/tarifesaniye ertarifeler/tarifesaniye “VoIP and Skype Security”, Simson L. Garfinkel “Network Protocols Handbook”, Javvin Technologies, INC

Thanks for your attention. You are welcome to ask questions.