Search results for: asterisk
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3

Search results for: asterisk

3 Implementing Advanced Security Measures in Asterisk-Driven VoIP Networks.

Authors: Washima Tuleun

Abstract:

Voice over Internet Protocol (VoIP) is a rapidly advancing technology that facilitates the transmission of voice and audio signals over the Internet or an IP-based network in real time. This technology has seen a significant rise in demand due to its advantages over traditional circuit-switched telephony, including lower call rates, reduced operational costs, easier management, and enhanced call features. However, the growth in VoIP usage has also increased the potential for various security threats and attacks, jeopardizing the privacy, confidentiality, and integrity of transmitted data. This paper presents the design of an Asterisk-based VoIP system and the implementation of a comprehensive security solution across the VoIP network. The study involves an in-depth analysis of VoIP technology, identifying its vulnerabilities and addressing potential threats. A security framework is proposed and implemented to safeguard the VoIP network. The designed system and security solutions are rigorously tested and evaluated to ensure robustness and effectiveness. The findings highlight critical security measures necessary for protecting VoIP infrastructures and provide a framework for future research and development in securing VoIP networks.

Keywords: asterisk, codec, cybersecurity, IPsec, malware, network security, phishing, telecoms, threats, telephony, VoIP

Procedia PDF Downloads 0
2 A Parasitic Resonator-Based Diamond Shape Microstrip Antenna for Ultra-Wide-Band Applications

Authors: M. Zulfiker Mahmud, M. Naimur Rahman, Farhad Bin Ashraf, Norbahiah Misran, Mohammad Tariqul Islam

Abstract:

This study proposes a diamond-shaped microstrip patch antenna for ultra-wideband applications. The antenna is made up of a diamond shape radiating patch, partial ground plane, and three asterisk-shaped parasitic elements. The parasitic elements are positioned above the ground plane to enhance the bandwidth and gain. The proposed antenna has a compact dimension of 30 x 25 x 1.6 mm3 and achieves an overall bandwidth (S11<-10dB) is 5.8 GHz from 2.7 GHz to 8.5 GHz. The antenna attains more than 4 dBi realized the gain and 80% efficiency over the bandwidth with omnidirectional radiation pattern. The design and simulation of the proposed antenna are performed in Computer Simulation Technology (CST) Microwave Studio. The observation during the analysis of the simulated data reveals that the proposed antenna is suitable for Ultra wide-band (UWB) applications where high gain is required.

Keywords: diamond-shaped antenna, microstrip antenna, parasitic resonator, UWB applications

Procedia PDF Downloads 215
1 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 265