This chapter covers the methodology of protection with VoIP protocol (SIP) in the following sectors:

•   Authentication

•   Encryption

•   Transport and network layer security

•   Threat model and prevention

•   Limitation

CHAPTER 7Protection with VoIP Protocol

This chapter demonstrates how to make Voice over Internet Protocol (VoIP) service secure with VoIP protocols, Session Initiation Protocol (SIP), and other supplementary protocols. Other session protocols like H.323 also have similar specifications and recommendations for security, which are not described here to avoid redundancy. Chapter 3, “Security Profiles in VoIP Protocols,” covers the security profiles of H.323.

This chapter focuses on the methodology of protection with SIP in the ...

Get Voice over IP Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.