| Peer-Reviewed

Study SIP Protocol on Asterisk Phone System and Offer Solutions to Its Security

Received: 31 May 2016    Accepted: 13 June 2016    Published: 23 June 2016
Views:       Downloads:
Abstract

Undoubted every organization’s heart is it’s phone system. The old phone systems couldn’t perform any method to make phone center and voice transmission intelligent on network and they had determinate abilities. Meantime Voice over Internet Protocol (VoIP) introduced itself to the world and performed a lot of abilities for clients like voice transmission on network. Many companies Investment on voip systems and implemented their methods on software and hardware packages. But between them a different production had designed and Performanced by Mark Spenser from Digium Company in 1992 which named Asterisk. Asterisk’s increasing popularity’s reason was its open code programs and its flexibility. VoIP systems such as Asterisk use voice transmission protocols to transfer voice over network. One of the voice transmission protocols is Session Initiation Protocol (SIP), which is one of the Asterisk’s voice transmission protocols. The first and the most important point in voice transmission over network is security. Security can be divided to two parts as inscrutability of invaders to network and coding transmitted voices over network to prevention of illegal listening. In this project at first we tried to introduce Asterisk phone system’s structure and Session Initiation Protocol (SIP) and then scrutiny method of Invader’s dominance to this protocol and Performance modern methods to prevent hacker’s dominance and also coding voice packages to Obscure them in transmission way.

Published in International Journal of Wireless Communications and Mobile Computing (Volume 4, Issue 3)
DOI 10.11648/j.wcmc.20160403.11
Page(s) 56-61
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Asterisk, Phone System, Security

References
[1] Penton, J., and A. Terzoli. "Asterisk: A converged tdm and packet-based communications system." Proceedings of SATNAC 2003-Next Generation Networks (2003).
[2] Schwarz, Brett. "Asterisk open-source PBX system." Linux Journal 2004. 118 (2004): 6.
[3] M. Spencer, M. Allison, C. Rhodes, The Asterisk Handbook, 2003, Asterisk Documentation Team, Available online at www.asterisk.org.
[4] QoS Routing in Networks with Inaccurate Information: Theory and Algorithms, Roch A. Guerin and Ariel Orda, in proceedings of INFOCOM, 1997.
[5] Improving QoS Routing Performance Under Inaccurate Link State Information, George Apostolopoulos, Roch Guerin, Sanjay Kamat, Satish K. Tripathi, in proceedings of ITC’16, June 1999.
[6] Quality of Service Based Routing: A Performance Perspective, George postolopoulous, Roch Guerin, Sanjay Kamat, Satish K. Tripathi, proceedings of ACM SIGCOMM 1998.
[7] R. Guérin, D. Williams, A. Orda, QoS Routing Mechanisms and OSPF Extensions, proceeding of GLOBECOMM 1997.
[8] G. Apostolopoulos, R. Guérin, S. Kamat, S. K. Tripathi, QoS Routing: A Performance Perspective, proceedings of ACM SIGCOMM. 1998.
[9] Shigang Chen, Klara Nahrstedt, An Overview of Quality-ofervice Routing for the Next Generation High-Speed Networks: Problems and Solutions, IEEE Network Magazine, Special Issue on Transmission and Distribution of Digital Video, Vol. 12, No. 6, November-December 1998, pp 64-79.
[10] Z. Wang, J. Crowcroft, Quality of Service Routing for Supporting Multimedia Applications, IEEE Journal Selected Areas in Communications, 1996.
[11] C. Huitema, Routing in the Internet, Prentice Hall Inc., New Jersey 1995 Mean delay / seconds X. Xiao, T. Telkamp, L, M. Ni,” A Practical Approach for Providing QoS in the Internet Backbone”, IEEE in Aug. 2001.
[12] B. Moore, E. Ellesson, J. Strassner,”Policy Framework for Multi-protocol Label Switching”, Internet draft, draft-ietfmpls framework, txt, 1999.
[13] E. Rosen, A. Viswanathan, R. callon,”Multiprotocol Lable mpls framework. txt, 1999.
[14] D. O Awduche, A. Chiu, A. Elwalid, I. Widjaja, X. Xiao,” A Framework for Internet Traffic Engineering”, Internet draft, draft-ietf mpls framework-04. txt, work in progress, expires October 2001, June 2000.
[15] T. Kelly, “VoIP for Dummies”, Wiley Publishing Inc, 2005.
[16] Johnston, Alan B, “SIP: understanding the Session Initiation Protocol”, Artech House Publishers, 2001.
[17] J. Penton, A. Terzoli, CANS: Customizable Alarm Notification System, an H. 323 Signalling Service, South African Telecommunications Networks and Applications Conference, September 2002, Drakensburg.
[18] Z. Chen, S. Guo, K. Zheng, H. Li, "Research on Man-in• the-Middle Denial of Service Attack in SIP VoIP", Networks Security, Wireless Communications and Trusted Computing, 2012. NSWCTC'09.
Cite This Article
  • APA Style

    Hadi Abdolmaleki, Masoud Masomi, Mohamad Noroozi, Fatemeh Mirzaei. (2016). Study SIP Protocol on Asterisk Phone System and Offer Solutions to Its Security. International Journal of Wireless Communications and Mobile Computing, 4(3), 56-61. https://doi.org/10.11648/j.wcmc.20160403.11

    Copy | Download

    ACS Style

    Hadi Abdolmaleki; Masoud Masomi; Mohamad Noroozi; Fatemeh Mirzaei. Study SIP Protocol on Asterisk Phone System and Offer Solutions to Its Security. Int. J. Wirel. Commun. Mobile Comput. 2016, 4(3), 56-61. doi: 10.11648/j.wcmc.20160403.11

    Copy | Download

    AMA Style

    Hadi Abdolmaleki, Masoud Masomi, Mohamad Noroozi, Fatemeh Mirzaei. Study SIP Protocol on Asterisk Phone System and Offer Solutions to Its Security. Int J Wirel Commun Mobile Comput. 2016;4(3):56-61. doi: 10.11648/j.wcmc.20160403.11

    Copy | Download

  • @article{10.11648/j.wcmc.20160403.11,
      author = {Hadi Abdolmaleki and Masoud Masomi and Mohamad Noroozi and Fatemeh Mirzaei},
      title = {Study SIP Protocol on Asterisk Phone System and Offer Solutions to Its Security},
      journal = {International Journal of Wireless Communications and Mobile Computing},
      volume = {4},
      number = {3},
      pages = {56-61},
      doi = {10.11648/j.wcmc.20160403.11},
      url = {https://doi.org/10.11648/j.wcmc.20160403.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.wcmc.20160403.11},
      abstract = {Undoubted every organization’s heart is it’s phone system. The old phone systems couldn’t perform any method to make phone center and voice transmission intelligent on network and they had determinate abilities. Meantime Voice over Internet Protocol (VoIP) introduced itself to the world and performed a lot of abilities for clients like voice transmission on network. Many companies Investment on voip systems and implemented their methods on software and hardware packages. But between them a different production had designed and Performanced by Mark Spenser from Digium Company in 1992 which named Asterisk. Asterisk’s increasing popularity’s reason was its open code programs and its flexibility. VoIP systems such as Asterisk use voice transmission protocols to transfer voice over network. One of the voice transmission protocols is Session Initiation Protocol (SIP), which is one of the Asterisk’s voice transmission protocols. The first and the most important point in voice transmission over network is security. Security can be divided to two parts as inscrutability of invaders to network and coding transmitted voices over network to prevention of illegal listening. In this project at first we tried to introduce Asterisk phone system’s structure and Session Initiation Protocol (SIP) and then scrutiny method of Invader’s dominance to this protocol and Performance modern methods to prevent hacker’s dominance and also coding voice packages to Obscure them in transmission way.},
     year = {2016}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Study SIP Protocol on Asterisk Phone System and Offer Solutions to Its Security
    AU  - Hadi Abdolmaleki
    AU  - Masoud Masomi
    AU  - Mohamad Noroozi
    AU  - Fatemeh Mirzaei
    Y1  - 2016/06/23
    PY  - 2016
    N1  - https://doi.org/10.11648/j.wcmc.20160403.11
    DO  - 10.11648/j.wcmc.20160403.11
    T2  - International Journal of Wireless Communications and Mobile Computing
    JF  - International Journal of Wireless Communications and Mobile Computing
    JO  - International Journal of Wireless Communications and Mobile Computing
    SP  - 56
    EP  - 61
    PB  - Science Publishing Group
    SN  - 2330-1015
    UR  - https://doi.org/10.11648/j.wcmc.20160403.11
    AB  - Undoubted every organization’s heart is it’s phone system. The old phone systems couldn’t perform any method to make phone center and voice transmission intelligent on network and they had determinate abilities. Meantime Voice over Internet Protocol (VoIP) introduced itself to the world and performed a lot of abilities for clients like voice transmission on network. Many companies Investment on voip systems and implemented their methods on software and hardware packages. But between them a different production had designed and Performanced by Mark Spenser from Digium Company in 1992 which named Asterisk. Asterisk’s increasing popularity’s reason was its open code programs and its flexibility. VoIP systems such as Asterisk use voice transmission protocols to transfer voice over network. One of the voice transmission protocols is Session Initiation Protocol (SIP), which is one of the Asterisk’s voice transmission protocols. The first and the most important point in voice transmission over network is security. Security can be divided to two parts as inscrutability of invaders to network and coding transmitted voices over network to prevention of illegal listening. In this project at first we tried to introduce Asterisk phone system’s structure and Session Initiation Protocol (SIP) and then scrutiny method of Invader’s dominance to this protocol and Performance modern methods to prevent hacker’s dominance and also coding voice packages to Obscure them in transmission way.
    VL  - 4
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • Telecommunication Department of Non-profit Institution of Higher Education, ABA University, Abyek, Qazvin, Iran

  • Telecommunication Department of Non-profit Institution of Higher Education, ABA University, Abyek, Qazvin, Iran

  • Telecommunication Department of Non-profit Institution of Higher Education, ABA University, Abyek, Qazvin, Iran

  • Telecommunication Department of Non-profit Institution of Higher Education, ABA University, Abyek, Qazvin, Iran

  • Sections