S1 File -

التفاصيل البيبلوغرافية
العنوان: S1 File -
المؤلفون: David Samuel Bhatti, Salbia Sidrat, Shahzad Saleem, Annas Wasim Malik, BeomKyu Suh, Ki-Il Kim, Kyu-Chul Lee
سنة النشر: 2024
مصطلحات موضوعية: Microbiology, Mental Health, Biological Sciences not elsewhere classified, Information Systems not elsewhere classified, voip networks indicates, uses wlan connectivity, tls ), ipsec, rigorously analyzed using, harness wlan connectivity, symmetric key sharing, secret key generation, secret key exchanges, key exchange scheme, based voip technology, multicore computer systems, communication coverage area, requires added security, different security protocols, underlying sip technology, serve incoming calls, local communication within, diffie &# 8211, complex internet protocols, c queuing models, protect sip communication, public keys instead, private key pairs, based sip servers, session initiation protocol
الوصف: The rapid replacement of PSTN with VOIP networks indicates the definitive phase-out of the PBX/PABX with smartphone-based VOIP technology that uses WLAN connectivity for local communication; however, security remains a key issue, regardless of the communication coverage area. Session initiation protocol (SIP) is one of the most widely adopted VOIP connection establishment protocols but requires added security. On the Internet, different security protocols, such as HTTPS (SSL/TLS), IPSec, and S/MIME, are used to protect SIP communication. These protocols require sophisticated infrastructure and some pose a significant overhead that may deteriorate SIP performance. In this article, we propose the following: i) avoid using Internet bandwidth and complex Internet protocols for local communication within an organization, but harness WLAN connectivity, ii) use multi-threaded or multicore computer systems to handle concurrent calls instead of installing hardware-based SIP servers, and iii) run each thread in a separate core. Cryptography is a key tool for securely transmitting confidential data for long- and short-range communication, and the Diffie-Hellman (DH) protocol has consistently been a popular choice for secret key exchanges. Primarily, used for symmetric key sharing, it has been proven effective in generating public/private key pairs, sharing public keys securely over public channels, and subsequently deriving shared secret keys from private/public keys. This key exchange scheme was proposed to safeguard VOIP communication within WLANs, which rely on the SIP for messaging and multimedia communication. For ensuring an efficient implementation of SIP, the system was rigorously analyzed using the M/M/1 and M/M/c queuing models. We analyze the behavior of SIP servers with queuing models with and without end-to-end security and increase users’ trust in SIP security by providing a transparent sense of end-to-end security as they create and manage their private and public keys instead of relying on the underlying ...
نوع الوثيقة: dataset
اللغة: unknown
Relation: https://figshare.com/articles/dataset/S1_File_-/25063151
DOI: 10.1371/journal.pone.0293626.s001
الاتاحة: https://doi.org/10.1371/journal.pone.0293626.s001
https://figshare.com/articles/dataset/S1_File_-/25063151
Rights: CC BY 4.0
رقم الانضمام: edsbas.4CBA7AEA
قاعدة البيانات: BASE
الوصف
DOI:10.1371/journal.pone.0293626.s001