O'Reilly logo

Securing VoIP by Regis Jr Bates

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6

Other protocols SRTP, ZRTP, and SIPS

Abstract

Other security protocols can be employed to protect the Voice over IP (VoIP) depending on the user needs. These include Secure Real-Time Transport Protocol (SRTP), or securing the actual Real-Time Transport Protocol (RTP) packets on the media channel, Zimmerman Real-Time Transport Protocol (ZRTP), and secure Session Initiation Protocol (SIP). When looking at the way to secure the VoIP, two things come to mind: first is the signaling and control channel (SIP) and second is the media channel (RTP). Initially no one cared about the call setup and teardown, until the SIP messages were manipulated and calls could be redirected to a third party or forked to multiple extensions. When this ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required