Securing mobile VoIP privacy with tunnels

Hoogesteger, Martijn (2016) Securing mobile VoIP privacy with tunnels.

[img]
Preview
PDF
1MB
Abstract:In many VoIP solutions, it is not clear how secure communications actually are. Using SIP and RTP is definitely not secure, and their secure counterparts might still leak some information. The communications happen over a widely and easily accessible network however; contrary to PSTNs, IP networks are much easier to infringe upon, so the communications are exposed. By using a VPN to protect communications, not only VoIP traffic is protected, but also all other traffic that makes use of the secure tunnel. This can provide an integral solution, if it is feasible. In this thesis, this problem will be addressed, and the question will be answered: How to secure VoIP to protect privacy on mobile phones? To answer this main question, these sub-questions will be addressed: 1. What are VoIP communication characteristics? To say anything about VoIP, we first look into what VoIP protocols actually look like. Different protocols and technologies will be analyzed and traffic characteristics measured. VoIP infrastructure will be set up as a testbed. 2. What are the differences between mobile VoIP solutions? Currently, many solutions for VoIP already exist on the mobile app markets. These applications will be reviewed and tested on efficiency and security. Based on this, we can gain some idea of the technologies currently used and how privacy is protected in these applications. 3. How does a VPN tunnel affect different types of traffic? To see how we can safely tunnel traffic through a VPN, we have to look into what the VPN does with the data. A VPN network will be set up as a testbed. While performance analysis shows small differences between OpenVPN and IPSec, tests can be done to check performance depending on configuration, packet size, throughput and other variables that might occur in traffic. This will provide a basis for setting up VoIP through a VPN. 4. How can VoIP be secured with a tunnel? To secure VoIP, a tunnel connection can be used. This provides more features and less adaptation to software than other solutions. How this can be done and how secure such solutions are will be analyzed and discussed.
Item Type:Essay (Master)
Clients:
Ministerie van Binnenlandse Zaken
Faculty:EEMCS: Electrical Engineering, Mathematics and Computer Science
Subject:54 computer science
Programme:Computer Science MSc (60300)
Link to this item:http://purl.utwente.nl/essays/71208
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page