Abstract
We first discusses some threats to VoIP system and H. 323 architectures designed for VoIP communications on security point of view. Continues with presenting security requirements of VoIP, and explaining the essential security constraints surrounding a seccessful VoIP deployment. Finally, suggests some strategies to implement the security and encryption functions of VoIP system based on H. 323.
Similar content being viewed by others
References
Campbell A, Coulson G, Huchison D.Transporting QoS Adaptive Flows, Multimedia Systems. New York: Springer-Verlag, 1988:167–178.
Mika M. Security Requirements and Constraints of VoIP.http://www.hut.fi/~mmarjala/voip Dec, 21, 2001.
Atal B S. High-quality Speech at Low Bit Rates Multi-pulse and Stochastically Excited Linear Predictive Coders.Proc IC-ASSP, 1986,10:1681–1684.
ITU-T. ITU-T Recommendation H. 235 (02/98), Security and Encryption for H-Series (H. 323 and other H. 245-based) Multimedia Terminals. America. ITU, 1998.
Richard V Cox, Kroon P. Low Bit-Rate Speech Coders for Multimedia Communication.IEEE Communication Magazine, 1996,9(5):21–27.
Author information
Authors and Affiliations
Additional information
Foundation item: Support by the National Natural Science Foundation of China (90104002)
Biography: HUANG Yong-feng (1967-), male, postdoctoral fellow, research direction: multimedia communication based on IP protol.
Rights and permissions
About this article
Cite this article
Yong-feng, H., Ze, D. & Xing, L. Security issues in VoIP based on H.323. Wuhan Univ. J. Nat. Sci. 9, 420–424 (2004). https://doi.org/10.1007/BF02830435
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02830435