A Security Approach using SIP Protocol in Imbedded Systems

Toniclay Andrade Nogueira, Adauto Cavalcante Menezes, Admilson De Ribamar Lima Ribeiro, Edward David Moreno Ordonez

2017

Abstract

Voice over IP communication will dominate the world. However, given the growing demand for voice and data communication to make any and all communication reliable and secure, several attacks occur frequently in communication networks, so this work is based on verifying security, analyzing risks, vulnerabilities, such as verifying the attacks and proposing a security measure for voice over IP communication on embedded devices.

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38(4):393-422.
  2. Ball, Stuart - ”Embedded Microproceessor Systems: Real Woard Desing”, 3º edition, Editora:Mcpros, EUA, 2005.
  3. Barbosa, Camila Soares. Voz sobre IP em Redes Locais sem Fio. CEFET - Centro Federal de Educação Tecnológica de Goiás. Goiânia, (2006).
  4. Barr, M. (1999). Programming embedded systems in C and C++. O'Reilly.
  5. Carro, L. and Wagner, F. R. (2003). Sistemas computacionais embarcados. Jornadas de atualização em informática. Campinas: UNICAMP.
  6. Cíž, P., Lábaj, O., Podhradský, P., & Londák, J. (2012). VoIP Intrusion Detection System with Snort. In ELMAR, 2012 Proceedings (pp. 137-140). IEEE.
  7. Cuervo, F., Greene, N., Rayhan, C., Rosen, B., and Segers, J. (2000). Megaco Protocol Version 1.0 RFC 3015 (Proposed Standrd). Obsoleted by RFC 3525.
  8. D. Butcher, X. Li, and J. Guo. Security challenge and defense in VoIP infrastructures. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 37(6):1152-1162, November 2007.
  9. DEFSIP. Definindo o que é um protocolo de sinalização. Disponível em http://www.gta.ufrj.br/grad/06_1/SIP/ Definindooqueumprotocolodesinalizao.html, acessado em 27 nov 2016.
  10. Lomotey, R. K. and DETERS, R. (2014). Intrusion Prevention in Asterisk-Based Telephony System. In 2014 IEEE International Conference on Mobile Services, pages 116-123.IEEE.
  11. Marwedel, P. (2011). Embedded system design. Springer.
  12. Nakamura, Emílio T.; GEUS, Paulo Lício de. Segurança de rede em ambientes corporativos. São Paulo: Novatec Editora, 2007.
  13. Raake, A. Speech quality of VoIP: assessment and prediction. [S.l.]: John Wiley & Sons, 2007.
  14. Rehman, U. U. and Abbasi, A. G. (2014). Security analysis of VoIP architecture for identifying SIP vulnerabilities. In 2014 International Conference on Emerging Technologies (ICET), number i, pages 87-93. IEEE.
  15. Reis, Claiton - “Sistemas Operacionais para Sistemas Embarcados”, Tutorial, Editora: EDUFBA, BRASIL, 2004.
  16. Silva, Adailton. Qualidade de Serviço em VoIP - Rede Nacional de Ensino e Pesquisa. Maio/2000 - Disponível em: http://www.rnp.br/newsgen - Acessado em 18/11/2016.
  17. Siqueira, Tórgan Flores de ; Menegotto, C. C. ; Weber, T. S. ; César Netto, João ; Wagner, F. R. . Desenvolvimento de Sistemas Embarcados para Aplicações Críticas. In: Escola Regional de Redes de Computadores, 2006, Passo Fundo. Escola Regional de Redes de Computadores. Porto Alegre : Sociedade Brasileira de Computação, 2006. v. 1. p. 1-10.
  18. Sitolino, Cláudio Luiz., Voz sobre IP - Um estudo experimental 1999. http://www.inf.ufrgs.br/pos/ SemanaAcademica/Semana99/sitolino/sitolino.html. Acessado 16/08/2016.
  19. Stallings, W. (2008). Criptografia e segurança de redes: princípios e práticas. PRENTICE HALL BRASIL.
  20. Stapko, T. (2011). Practical Embedded Security: Building Secure Resource-Constrained Systems. Embedded technology series. Elsevier Science.
  21. Thermos, P.; Takanen, A. Securing VoIP networks: threats, vulnerabilities, countermeasures. Boston: Pearson Education, 2007.
  22. Walker, J. Q.; HICKS, J. T. Taking charge of your VoIP project. [S.l.]: Cisco Press, 2004.
Download


Paper Citation


in Harvard Style

Nogueira T., Menezes A., Ribeiro A. and Ordonez E. (2017). A Security Approach using SIP Protocol in Imbedded Systems . In Proceedings of the 13th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST, ISBN 978-989-758-246-2, pages 352-355. DOI: 10.5220/0006354403520355


in Bibtex Style

@conference{webist17,
author={Toniclay Andrade Nogueira and Adauto Cavalcante Menezes and Admilson De Ribamar Lima Ribeiro and Edward David Moreno Ordonez},
title={A Security Approach using SIP Protocol in Imbedded Systems},
booktitle={Proceedings of the 13th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,},
year={2017},
pages={352-355},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006354403520355},
isbn={978-989-758-246-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,
TI - A Security Approach using SIP Protocol in Imbedded Systems
SN - 978-989-758-246-2
AU - Nogueira T.
AU - Menezes A.
AU - Ribeiro A.
AU - Ordonez E.
PY - 2017
SP - 352
EP - 355
DO - 10.5220/0006354403520355