DocumentCode
2368355
Title
A study of global numbering plan with active anti-spit capability on VoIP
Author
Hsia-Ling Chiang ; Shu-Ming, Yeh ; Ming-Hong, Hong ; Lin, John
Author_Institution
Hsing Wu Coll., Taipei
fYear
2008
fDate
13-16 Oct. 2008
Firstpage
17
Lastpage
22
Abstract
The traditional E.164 codepsilas regularity enables the scoundrel to be possible not after the telecommunication userpsilas permission on easily the segment to userpsilas telephone number. It is difficult to meet the VoIP protection needs for using the packet filtering technology with the network-level gatekeeper defense mechanism. This paper proposed a VoIP access authorization verifying center (AAVC) mechanism which uses cocktail-like concept, which is integrated network-layer and circuit-layer and application-layer together to obtain both security and convenience of telecommunication demands. The telephone number with an arbitrarily user-established authorization verifying code is used to protect this screen host gateway mechanism. When the sender dials the IP telephone, he must dial in the telephone number and then dial * (star key) and input the confirmed identification code, after the registration server and the remote-end verification database compare the verifying code, then it gives the connection transfer through. This research inquired the AAVC confirmation mechanism has confirmed the whole construction design of the query server and the verification server. Also, under the global telecommunication networkpsilas tidal current, this research founds one to have the jurisdiction management, active Anti-Spam and the IP service graduation authorization global numbering plan.
Keywords
Internet telephony; authorisation; information filtering; internetworking; telecommunication security; unsolicited e-mail; IP telephony; VoIP; access authorization verifying center mechanism; active anti-SPIT capability; active anti-spam; global numbering plan; identification code; jurisdiction management; network-level gatekeeper defense mechanism; packet filtering technology; query server design; remote-end verification database; traditional E.164 code regularity; user telephone number; verification server design; Authentication; Authorization; Costs; Databases; Educational institutions; Internet telephony; Network servers; Protection; Telecommunication computing; Web server; AAVC; Active Anti-Spam; Numbering plan;
fLanguage
English
Publisher
ieee
Conference_Titel
Security Technology, 2008. ICCST 2008. 42nd Annual IEEE International Carnahan Conference on
Conference_Location
Prague
Print_ISBN
978-1-4244-1816-9
Electronic_ISBN
978-1-4244-1817-6
Type
conf
DOI
10.1109/CCST.2008.4751270
Filename
4751270
Link To Document