DOC Version - University of South Australia

advertisement
Evaluation of users’ perspective
on VoIP’s security vulnerabilities
A thesis submitted in partial fulfillment of the requirements for the degree of
Master of Science (Computer and Information Science)
By
Alireza Heravi
Supervisors: Professor Jill Slay
Dr Sameera Mubarak
July 2011
School of Computer and Information Science
Mawson Lakes Campus
University of South Australia
Abstract
Voice over Internet protocol (VoIP) is a relatively new technology, representing a major new
trend in telecommunications and an alternative to traditional phone systems. The lower cost and
greater flexibility of VoIP are the key drivers that are making it widely acceptable. VoIP refers to
the transmission of voice conversations over IP-based networks. On the sending side, a VoIP
system converts voice, which is an analog signal, into a digital signal, splits it into packets and
transports it over IP networks. Conversely, on the receiving side, the digitized voice data is
reassembled and decoded.
VoIP, like other technologies, introduces both opportunities and security risks. VoIP uses IP
networks and therefore inherits their vulnerabilities. Adding voice traffic to IP networks
complicates security issues and introduces a range of vulnerabilities. A VoIP system may face
either an exclusive attack or an attack to the underlying IP network. To retain a secure VoIP
system, both IP network and the VoIP-specific security issues must be addressed. It cannot be
assumed that VoIP systems will remain secure if they are plugged into a secure IP network. For
this reason VoIP systems require additional security controls.
The significance of security and privacy in VoIP communications are well known, and many
studies mostly from the technical perspective have been published. However to date, no known
research has been conducted to evaluate users’ perspectives on these issues. In light of this
scarcity, this thesis aims to evaluate users’ awareness of VoIP security vulnerabilities, and their
attitudes towards privacy in VoIP communications.
I
Declaration
I declare that this thesis does not, to the best of my knowledge and belief, incorporate without
acknowledgment any material previously submitted for a degree or diploma in any university, or
contain any materials previously published or written by another person except where due
reference is made in the text.
Alireza Heravi
12 June 2011
II
Acknowledgments
During working on this thesis, I was being assisted and supported either directly or indirectly.
Either way, each and every one’s contribution has been of immense help. I thank them dearly for
their time and effort.
In particular, I wish to express my gratitude to Professor Jill Slay and Dr Sameera Mubarak, my
thesis supervisors, for their persistence and support. I truly appreciate their input, help and
support.
I also must thank my mother and my sister in law, Dr Siavoush Kahkeshan, for their support and
my dearest friend, behdad, for encouraging me.
III
Table of Contents
Chapter 1- Introduction ......................................................................................................... 1
1-1 Overview..................................................................................................................................2
1-2 Background ..............................................................................................................................2
1-3 Purpose of this study ................................................................................................................3
1-4 Aims of this thesis ....................................................................................................................3
1-5 Research question ....................................................................................................................4
1-6 Significance of this study...........................................................................................................4
1-7 Summary of thesis chapters ......................................................................................................5
Chapter 2- Literature Review ................................................................................................. 6
2-1 Overview..................................................................................................................................7
2-2 Groundwork of VoIP .................................................................................................................7
2-2-1 Telephony system ........................................................................................................................ 7
2-2-2 The Internet ................................................................................................................................. 8
2-3 VoIP Architecture .....................................................................................................................9
2-3-1 PSTN versus VoIP ......................................................................................................................... 9
2-3-2 VoIP implementation ................................................................................................................. 10
2-3-2-1 PC-to-PC.............................................................................................................................. 10
2-3-2-2 PC-to-Phone/ Phone-to-PC................................................................................................. 11
2-3-2-3 Phone to Phone .................................................................................................................. 13
2-4 VoIP Technology ..................................................................................................................... 14
2-4-1 Signaling..................................................................................................................................... 15
2-4-2 Encoding/Decoding.................................................................................................................... 16
2-4-3 Transport ................................................................................................................................... 17
2-4-3-1 Bandwidth efficiency .......................................................................................................... 20
2-4-4 Gateway ..................................................................................................................................... 25
2-5 Security/privacy ..................................................................................................................... 27
2-5-1 VoIP/PSTN security: a comparison ............................................................................................ 28
2-5-2 VoIP security .............................................................................................................................. 28
2-5-2-1 General VoIP security issues .............................................................................................. 29
IV
2-5-2-2 VoIP providers’ security issues ........................................................................................... 30
2-5-2-3 SIP/H.323 security .............................................................................................................. 32
2-5-2-4 Man-In-The-Middle (MITM) and Denial of Service (DoS)................................................... 33
2-5-2-5 Spam over Internet Telephony........................................................................................... 34
2-5-2-6 Biometric encryption .......................................................................................................... 35
2-5-3 Myths about VoIP security ........................................................................................................ 35
2-5-4 VoIP Threat Taxonomy .............................................................................................................. 37
Chapter 3- Methodology...................................................................................................... 40
3-1 Overview................................................................................................................................ 41
3-2 Approach ............................................................................................................................... 42
3-2-1 Research epistemologies ........................................................................................................... 42
3-2-1-1 Positivist studies ................................................................................................................. 43
3-2-1-2 Interpretation studies ........................................................................................................ 44
3-2-1-3 Critical studies .................................................................................................................... 45
3-2-2 Qualitative or quantitative research ......................................................................................... 46
3-2-1-1 Qualitative research ........................................................................................................... 46
3-2-1-2 Quantitative research ......................................................................................................... 47
3-2-1-3 Triangulation ...................................................................................................................... 48
3-2-1-4 Compare and contrast: quantitative versus qualitative research ...................................... 50
3-2-3 Research reasoning process ...................................................................................................... 52
3-2-3-1 Deductive reasoning ........................................................................................................... 52
3-2-3-2 Inductive reasoning ............................................................................................................ 52
3-2-3-3 Compare and contrast: deductive versus inductive reasoning .......................................... 53
3-3 Sampling ................................................................................................................................ 54
3-4-1 General universe, population and sample ................................................................................ 55
3-4-2 Sampling types........................................................................................................................... 56
3-4-3 The used sampling type ............................................................................................................. 57
3-4-3-1 Simple Random Sampling ................................................................................................... 58
3-4-3-2 Purposive sampling ............................................................................................................ 59
3-4 Data Analysis (Quantitative Data) ........................................................................................... 60
3-4-1 Coding ........................................................................................................................................ 60
V
3-4-2 Relationship between variables ................................................................................................ 61
3-5 Research Ethics....................................................................................................................... 62
3-6 Questionnaire design .............................................................................................................. 63
3-7 Summary................................................................................................................................ 64
Chapter 4- Results ............................................................................................................... 65
4-1 Overview................................................................................................................................ 66
4-2 The survey results................................................................................................................... 66
4-2-1 Background ................................................................................................................................ 67
4-2-1-1 Nationality .......................................................................................................................... 67
4-2-2-2 Average monthly talking time ............................................................................................ 68
4-2-3-3 Average monthly international call time via phone/mobile .............................................. 69
4-2-4-4 Using computers to make calls/voice chat......................................................................... 72
4-2-5-5 Average monthly use of computers to make calls/voice chat ........................................... 73
4-2-6-6 Preferred way to make international calls ......................................................................... 74
4-2-7-7 Preferred service for international calls via land line/mobile ............................................ 77
4-2-8-8 Preferred software for making calls/voice chat ................................................................. 78
4-2-2 Awareness/attitude towards VoIP security/privacy.................................................................. 80
4-2-2-1 Concerned features when making international calls........................................................ 80
4-2-2-2 Comparison of security between international/long distance calls and domestic calls .... 82
4-2-2-3 Privacy concerns when making calls .................................................................................. 83
4-2-2-4 Traditional telephony security versus VoIP security .......................................................... 86
4-2-2-5 Concern about VoIP privacy (eavesdropping) .................................................................... 88
4-2-2-6 Possibility of privacy breaches in VoIP versus traditional telephony ................................. 90
4-2-2-7 Concern about VoIP security .............................................................................................. 90
4-2-2-8 Possibility of privacy/security breaches in VoIP ................................................................. 91
4-2-2-9 Discussing security/privacy issues with service providers ................................................. 92
4-2-2-10 The discussed security/privacy issues with service providers ......................................... 93
4-5 Summary................................................................................................................................ 94
Chapter 5- Discussion .......................................................................................................... 95
5-1 Overview................................................................................................................................ 96
VI
5-2 Discussion of the results and findings ...................................................................................... 96
5-2-1 Background ................................................................................................................................ 96
5-2-1-1 Nationality .......................................................................................................................... 96
5-2-1-2 Average monthly talking time ............................................................................................ 96
5-2-1-3 Average monthly international call time ............................................................................ 98
5-2-1-4 Using computers to make calls/voice chat......................................................................... 99
5-2-1-5 Average monthly use of computer to make calls/voice chat ........................................... 100
5-2-1-6 Preferred way to make international calls ....................................................................... 101
5-2-1-7 Preferred service for international calls via land line/mobile .......................................... 101
5-2-1-8 Preferred software for making calls/voice chat ............................................................... 102
5-2-2 Awareness/attitude towards VoIP security/privacy................................................................ 102
5-2-2-1 Concerned features when making international calls...................................................... 102
5-2-2-2 Comparison of security between international/long distance calls and domestic calls .. 103
5-2-2-3 Privacy concerns when making calls ................................................................................ 103
5-2-2-4 Comparison of VoIP and traditional telephony from privacy/security perspective ........ 104
5-2-2-5 Concern about VoIP privacy (eavesdropping)/security.................................................... 105
5-2-2-6 Discussing security/privacy issues with service providers ............................................... 105
5-3 Limitations ........................................................................................................................... 106
5-4 Further research ................................................................................................................... 106
Chapter 6- Conclusion………….. ........................................................................................... 108
Appendix A – Participant information sheet....................................................................... 112
Appendix B- Recruitment email ......................................................................................... 114
Appendix C – Questionnaire .............................................................................................. 115
References ........................................................................................................................ 119
VII
List of Figures
Chapter 2
Figure 2-1 VoIP implementation: PC-to-PC ................................................................................................... 11
Figure 2-2 VoIP implementation: PC-to-Phone ............................................................................................. 12
Figure 2-3 VoIP implementation: Phone-to-PC ............................................................................................. 12
Figure 2-4 VoIP implementation: Phone-to-Phone........................................................................................ 13
Figure 2-5 Pure VoIP implementation: IP Phone-to-IP Phone........................................................................ 13
Figure 2-6 Multi-site enterprise VoIP implementation .................................................................................. 14
Figure 2-7 IP header .................................................................................................................................... 17
Figure 2-8 UDP header ................................................................................................................................ 18
Figure 2-9 RTP/UDP/IP packet…….…......…Figure 2-10 RTP/UDP/IP packet ..................................................... 19
Figure 2-11 RTP header ............................................................................................................................... 19
Figure 2-12 IPv4/UDP/RTP headers (40 bytes) .............................................................................................. 22
Figure 2-13 IPv6/UDP/RTP headers (60 bytes) .............................................................................................. 22
Figure 2-14 IPv4/IPv6/UDP/RTP header compression ................................................................................... 23
Figure 2-15 50% payload efficiency .............................................................................................................. 23
Figure 2-16 VoIP/PSTN gateway................................................................................................................... 26
Chapter 3
Figure 3-1 Overall research process.............................................................................................................. 41
Figure 3- 2 Deductive research reasoning process Figure 3-3 Inductive research reasoning process .............. 53
Figure 3-4 Sampling overlapping entities...................................................................................................... 55
Figure 3-5 Classification of sampling ............................................................................................................ 57
Chapter 4
Figure 4-1 Overall results by country ............................................................................................................ 67
Figure 4-2 Number of Participants by Country .............................................................................................. 67
Figure 4- 3 The main reason for choosing a service for international calls via Land line/mobile ...................... 77
Figure 4- 4 Reason for choosing software for making calls/ voice chat by computer....................................... 79
Figure 4-5 The most concerned feature when making international calls ....................................................... 80
Figure 4- 6 Valid and irrelevant answers....................................................................................................... 91
Figure 4- 7 Valid, invalid and irrelevant answers ........................................................................................... 93
VIII
List of Tables
Chapter 1
Table 1- 1 summary of thesis chapters ............................................................................................................................. 5
Chapter 2
Table 2- 1 Audio Codecs ..................................................................................................................................................16
Table 2-2 The three myths about VoIP security ...............................................................................................................36
Table 2-3 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – Misrepresentation treat ...........................................37
Table 2- 4 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – various treats...........................................................38
Table 2-5 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – Interruption of Service treat .....................................39
Table 2- 6 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – Other Interruption of Service treat ..........................39
Chapter 3
Table 3-1 The Different axioms between qualitative (naturalist) and quantitative (positivist) research..........................50
Table 3-2 Qualitative and quantitative research compared and contrasted (adapted from Glesen and Peshkin (1992) ..51
Table 3- 3 Definition of group of individuals in this thesis ...............................................................................................55
Table 3- 4 Data Analysis ..................................................................................................................................................61
Chapter 3
Table 4-1 Average monthly talking time ..........................................................................................................................68
Table 4-2 Relationship between talking time and being concern about VoIP privacy (eavesdropping)............................68
Table 4-3 Relationship between talking time and being concern about VoIP security .....................................................69
Table 4- 4 Average monthly international call time .........................................................................................................70
Table 4-5 Relationship between international talking time and being concern about privacy when making calls ...........70
Table 4-6 Relationship between international talking time and being concern about VoIP privacy (eavesdropping) ......71
Table 4-7 Relationship between international talking time and being concern about VoIP security ................................72
Table 4- 8 Usage of computers to make calls/voice chat .................................................................................................72
Table 4-9 Relationship between using computer to make calls/voice chat and possibility of privacy breaches ...............73
Table 4-10 Average monthly use of computer to make calls/voice chat ..........................................................................74
Table 4-11 Preferred way to make international calls .....................................................................................................74
Table 4-12 Relationship between the preferred way to make international calls and participants’ opinion about
whether traditional telephony is more secure than VoIP ..................................................................................75
Table 4-13 Relationship between the preferred way to make international calls and participants’ concern about
VoIP privacy ......................................................................................................................................................75
Table 4-14 Relationship between the preferred way to make international calls and participants’ concern about
VoIP security .....................................................................................................................................................76
Table 4-15 Preferred software for making calls/voice chat .............................................................................................79
Table 4-16 Relationship between the most concerned feature when making international and participants’ concern
about VoIP privacy ............................................................................................................................................81
Table 4- 17 Are international/long distance calls less secure than domestic calls? ..........................................................82
IX
Table 4-18 relationship between participants’ opinion about whether international/long distance calls are less
secure than domestic calls and whether privacy breaches in traditional telephony is more possible or in
VoIP ...................................................................................................................................................................83
Table 4- 19 Concern about privacy when making calls/ voice chat (Five-point scale) ......................................................84
Table 4-20 relationship between participants’ concerns about privacy when making calls and participants’ concerns
about VoIP privacy ............................................................................................................................................85
Table 4-21 relationship between participants’ concerns about privacy when making calls and participants’ concerns
about VoIP security ...........................................................................................................................................86
Table 4-22 Is traditional telephony (land line/mobile) more secure than VoIP? ..............................................................86
Table 4-23 relationship between participants’ opinion about whether traditional telephony is more secure than
VoIP and whether privacy breaches in traditional telephony is more possible or in VoIP ..................................87
Table 4-24 Concern about VoIP privacy (eavesdropping) ................................................................................................88
Table 4-25 relationship between participants’ concern about VoIP privacy and VoIP security ........................................89
Table 4-26 Privacy breach is more possible in traditional telephony or VoIP? .................................................................90
Table 4-27 Concerned about VoIP security (Five-point scale) ..........................................................................................91
Table 4-28 Discussing security/privacy issues with telephone/VoIP service provider ......................................................92
Table 4-30 The discussed security/privacy issues with service providers.........................................................................93
X
Acronyms
ARPANET Advanced Research Projects Agency Network
CLASS
Custom Local Area Signaling Services
codec
coder - decoder
iLBC
Internet Low Bitrate Codec
IN
Intelligent Network
ITU
International Telecommunication Union
ITU-T
International Telecommunication Union - Telecommunication Standardization Sector
PCM
pulse code modulation
POTS
Plain Old Telephone Service
PSTN
Public Switched Telephone Network
QoS
Quality of Service
RTCP
Real Time Control Protocol
RTP
Real-time Transport Protocol
SIP
Session Initiation Protocol
SS7
Signaling System 7
TCP
Transmission Control Protocol
UDP
User Datagram Protocol
VDA
Voice Activity Detection
VoIP
Voice over IP
XI
Chapter 1- Introduction
This chapter serves as the introduction to this thesis and reviews the background literature. It is
organized as follows:
Section 1.1
provides an overview of this chapter
Section 1.2
introduces the background of this thesis
Section 1.3
states the purpose of this thesis
Section 1.4
defines the aims of this thesis
Section 1.5
states the research questions which this thesis intends to answer
Section 1.6
describes the significance of this thesis
Section 1.7
summarizes the chapters of this thesis
1
Chapter 1- Introduction |
1-1 Overview
The following section discusses the background of this thesis by introducing a general overview
of Voice over Internet Protocol (VoIP) technology and its security and privacy vulnerabilities.
First, the purpose and aims of this study are defined. Next, the major research question that
this thesis intends to answer is stated, followed by a discussion on the significance of this thesis.
Thirdly and finally, a summary of how the following chapters are organized is provided.
1-2 Background
For almost a century, person-to-person communication was dominated by Bell’s legacy, the
traditional telephony system. Due to recent advances in the Internet since the 1990s, the
“Internet Telephony” technology has now enabled person-to-person communication to take
place via computer networks on a global scale.
VoIP is an umbrella term for the technologies that enable voice to be transmitted over packetswitched IP networks, such as the Internet. VoIP is comprised of a large number of components
including, end user equipment (traditional handsets, softphones or PCs and IP phones), end
user applications (Skype, X-Lite, Net-Meeting, etc.), call managers, gateways, switches, routers
and protocols.
The lower cost and greater flexibility that characterize the main advantages of VoIP over the
public switched telephone network (PSTN) are mostly related to the method that voice is
transmitted. However, this method - the convergence of voice and data in IP networks complicates security issues and introduces new vulnerabilities. VoIP systems are vulnerable to
both VoIP-specific attacks and attacks to the underlying IP network. Consequently, VoIP
systems require additional security controls.
In the literature, VoIP security has been addressed from technical and industrial perspectives.
However, no known research to the best of the researcher’s knowledge has evaluated users’
2
Chapter 1- Introduction |
perspectives on VoIP security and privacy vulnerabilities. To bridge this gap, this study seeks to
evaluate the users’ awareness and attitude towards privacy and security issues in VoIP
communications. The research methodology that was employed to investigate these matters is
quantitative and an on-line questionnaire was designed to collect information.
1-3 Purpose of this study
The significance of security issues in VoIP communications are well known, and many papers
have been published to address VoIP’s security vulnerabilities. To date, however, no known
research has been conducted to evaluate users’ perspective on these issues.
This study seeks to evaluate users’ awareness of VoIP security vulnerabilities, and their attitude
towards privacy in VoIP communications. An on-line questionnaire was designed to collect
information in order to investigate this matter. Chapter 3 explains the on-line questionnaire’s
approach and how it was designed, while Chapter 4 presents the results of the study.
1-4 Aims of this thesis
This thesis aims:
1- To explore the users’ perspective on security and privacy issues while using VoIP
services to communicate with other people.
2- To study the awareness of VoIP users about security issues and their attitudes towards
security-related vulnerabilities.
3
Chapter 1- Introduction |
1-5 Research question
This research will address the following question:
To what extend are VoIP users aware of VoIP security vulnerabilities and what are their
attitudes towards these issues?
To answer this question, a number of subsidiary questions will be explored in the following
order:
1- What is VoIP?
2- What is VoIP architecture and how could it be implemented?
3- What is VoIP security?
4- What are the sources of VoIP’s security vulnerabilities?
5- What is VoIP security and privacy threat taxonomy?
1-6 Significance of this study
The innovative nature of this study lies in the fact that it is examining security vulnerabilities of
VoIP from users’ perspective. To the best of the researcher’s knowledge, no such similar
academic research has been conducted.
4
Chapter 1- Introduction |
1-7 Summary of thesis chapters
The thesis chapters are summarized in Table 1-1.
Chapters
Summary
Chapter 1
The innovative nature of this study lies in the fact that it is examining
security vulnerabilities of VoIP from users’ perspective. To the best of the
researcher’s knowledge, no such similar academic research has been
conducted.
Chapter 2
A literature review addresses the purpose and aims of this thesis. VoIP
architecture and technology, overview of VoIP security and possible
vulnerabilities and users’ perspective on VoIP are discussed.
Chapter 3
The research methodology used in this thesis is described in order to answer
the research question that has been established.
Chapter 4
The results and findings of this study are presented.
Chapter 5
A discussion about the results is provided.
Chapter 6
Conclusion of this thesis is provided.
Table 1- 1 Summary of Thesis Chapters
5
Chapter 1- Introduction |
Chapter 2- Literature Review
This chapter reviews the existing literature concerning the background to the topic of this
thesis. It is organized as follows:
Section 2.1
provides an overview of the literature reviewed
Section 2.2
introduces the elements which contributed to the emergence of VoIP
technology
Section 2.3
describes VoIP architecture and compares it to PSTN
Section 2.4
describes VoIP technology
Section 2.5
provides an overview of VoIP security and introduces possible
vulnerabilities and threats to VoIP systems
6
Chapter 2- Literature Review |
2-1 Overview
This chapter reviews the studies that are relevant to the purpose and aims of this thesis. The
elements which contributed to the emergence of VoIP technology are introduced, followed by a
detailed description of VoIP architecture and technology. Furthermore, an overview of VoIP
security is presented and possible vulnerabilities and threats to VoIP systems are discussed.
2-2 Groundwork of VoIP
Although VoIP systems could be implemented purely based on IP networks, generally they are
interconnected to traditional telephony systems and rely on them for delivering voice traffic. In
fact, the interoperability of traditional and IP telephony systems significantly contributed to the
widespread acceptance of VoIP.
The invention of and advances telephony systems and the Internet have provided the
foundation of VoIP technology. The evolution of telephony systems and the Internet are
discussed in the following sections.
2-2-1 Telephony system
‘Mr. Watson, come here, I want to see you’; this phrase was the first ever transmitted speech
over wire and it was sent by Alexander Graham Bell in 1876 (Flood 1976; Brittain 2005). Bell’s
work evolved from a scientific curiosity into an essential communication method that has
influenced people’s lives ever since.
At the early stage, each two-call party devices were connected by a single wire and no dialing
was required. Later, the telephone system improved and instead of having physical cables
between each end-to-end receiver only one cable was needed to connect users to telephone
centers. Operators at telephone centers did the switching between call parties. As further
7
Chapter 2- Literature Review |
advances were made in telephony systems, manual switching was replaced by electronic
switches.
The basic telephone system is called the Plain Old Telephone Service (POTS) and in contrast, the
more advanced one which is able to carry both analog and digital traffic is called Public
Switched Telephone Network (PSTN)1. During the past decades PSTN developed from a
relatively non-complex network to a so-called Intelligent Network (IN). IN is based on a
signaling method known as Signaling System 7 (SS7), which enables PSTN to offer Custom Local
Area Signaling Services (CLASS) services. Examples of these include “Call blocking” and
“Automatic callback” (Davidson et al. 2006).
2-2-2 The Internet
On the 29th of October 1969 at 10:30 pm for the first time data was transferred over a packet
switched network. The network consisted of two nodes one located at Stanford Research
Institute (SRI) and the other one at University of California, Los Angeles (UCLA) connecting with
a link at 50kb/s. The researcher’s goal was to type the word “log” at UCLA’s node and SRI’s
node added “in” to it in order to create the word “login”. In practice, however, only “l” and “o”
were transmitted and then the UCLA’s machine crashed (Kleinrock 2008).
Later in that same year (1969) two other nodes - one at University of California at Santa Barbara
and the other one at University of Utah - were added to the two previous nodes and formed
the first four nodes of what became known as ARPANET (Kleinrock 2008; O'Neill 1995).
The above-mentioned research was a part of the Advanced Research Projects Agency Network
(ARPANET) deployment. ARPANET, the ancestor of the Internet, was the first operational
packet-switched network that was conducted by the Advanced Research Projects Agency
1
In some publications the term general switched telephone network (GSTN) is used to refer to the telephony system. However,
PSTN is more common.
8
Chapter 2- Literature Review |
(ARPA), established in February 1958 by the US Department of Defense (O'Neill 1995). Lukasik
(2010) provides an extensive discussion on why the ARPANET was built.
The invention of the World Wide Web (commonly known as the Web) was a milestone in the
history of the Internet. Its creator, Tim Berners-Lee, defines it “as the universe of global
network-accessible information” (Berners-Lee 1996). The tremendous commercial potential of
the Web attracted businesses and provided opportunities. The emergence of giant Internetrelated businesses such as eBay and Google indicates that a new era has arisen due to web
technologies.
What is called the Internet is in fact a massive infrastructure that exploits a wide range of
technologies and provides global communication channels for millions of people around the
world. VoIP is an example of such a communication channel.
2-3 VoIP Architecture
This section provides an overview of VoIP architecture by comparing it to PSTN, and describes
its implementations. Three main VoIP implementations are discussed: (1) PC-to-PC, (2) PC-toPhone/phone-to-PC and (3) Phone-to-Phone. These are high-level overviews of VoIP functional
architecture but they do not represent the physical implementation.
2-3-1 PSTN versus VoIP
The main difference between PSTN and VoIP is in the method by which they transmit voice
conversations. PSTN is a circuit switched network, while VoIP is a packet switched network.
PSTN uses reliable2 fixed bandwidth with an end-to-end dedicated line (circuit) which is set up
2
Carrier class reliability is a term which refers to the 99.999 % availability of the PSTN. The downtime of PSTN is about 5
minutes in a year.
9
Chapter 2- Literature Review |
by circuit switches. In contrast, VoIP splits the voice into packets and sends them independently
through various paths using shared bandwidth (Goode 2002).
PSTN is comprised of switches and network devices that provide fixed line telephone services.
Its Quality of Service (QoS) is high and its network availability is almost 100%, while VoIP’s QoS
is lower and its network availability is not known (Varshney et al. 2002). Additionally, VoIP is
based heavily on the already existing worldwide PSTN networks, even though its active
environment is the Internet. In fact, PSTN and VoIP overlap in terms of physical facilities as
some of VoIP’s traffic originates and terminates via PSTN (Groom & Groom 2004, p. 10). The
differences between PSTN and VoIP are discussed in detail in Schulzrinne and Rosenberg
(1999), Varshney et al.( 2002) and Bross and Meinel (2008).
2-3-2 VoIP implementation
VoIP can be broadly implemented in three different ways, namely PC-to-PC, PC-toPhone/phone-to-PC and Phone-to-Phone. These are discussed in sub-sections 2-3-2-1, 2-3-2-2
and 2-3-2-3, respectively.
2-3-2-1 PC-to-PC
The first commercial PC-to-PC VoIP application was introduced by VocalTec in 1995 (Corrocher
2003). VocalTec released the “Internet Phone” software which enabled telephone
conversations take place via PCs over the Internet (Groom & Groom 2004, p. 22). Figure 2-1
portrays VoIP PC-to-PC model. In this scenario, voice call is made from a softphone (computer)
to another softphone (computer) through the Internet; PSTN is not involved.
10
Chapter 2- Literature Review |
.
Figure 2-1 VoIP implementation: PC-to-PC
X-Lite (Mac/Windows), iChat (Mac), Gno-Phone (Linux), Net-Meeting (Windows) and Skype
(cross platform, supports Mac, Windows and Linux) are examples of VoIP client software. X-Lite
and Gno-Phone are designed to be used with different VoIP providers, including our own VoIP
server, while others have to be used with a certain VoIP provider.
Skype3 is the most prevalent VoIP PC to PC provider (Bonfiglio et al. 2008; Wallingeord 2006, p.
63) and its and its popularity has garnered the attention of the research community. For
instance, Skype protocol is discussed in detail in Baset and Schulzrinne (2006) and Skype traffic
is investigated in Perenyi et al. (2007), Bonfiglio et al. (2009), Branch, Heyde and Armitage
(2009), while Srivatsa et al. (2010) and Ye et al. (2009) address Skype privacy issues.
2-3-2-2 PC-to-Phone/ Phone-to-PC
Skype offers free services including PC-to-PC (Skype-to-Skype) voice/video calls, conference
calls and instant messaging. However, Skype also provides fee applied services including PC-toPSTN (SkypeOut), which makes it possible for calls to be placed from PCs to landlines/mobiles,
and PSTN-to-PC (SkypeIn). The last system enables calls to be placed from landlines/mobiles to
PCs.
3
www.skype.com
11
Chapter 2- Literature Review |
In a similar vein, Yahoo! Messenger provides free PC-to-PC (Yahoo! Messenger-to-Yahoo!
Messenger) calls, but also offers paid services, allowing users to initiate and receive calls
through “Phone Out” and “Phone In” services4.
Google’s introduction of its Google Voice service enabled the company to become a
telecommunication service provider like Skype and Yahoo. Currently, Google Voice offers free
inbound and outbound calls to Canada and the US and paid international calls5.
In the PSTN-to-PC scenario, voice call is made from PSTN telephones to PCs with VoIP software.
In this scenario, voice traffic originates from PSTN and is then transmitted over the Internet
(see Figure 2-3). In contrast, in the PC-to-PSTN scenario, voice call is made from PCs (with
appropriate VoIP software) to PSTN. Here, voice traffic terminates in PSTN after being
transmitted over the Internet (see Figure 2-2).
Figure 2-2 VoIP implementation: PC-to-Phone
Figure 2-3 VoIP implementation: Phone-to-PC
4
5
http://messenger.yahoo.com/features
http://www.google.com/googlevoice/whatsnew.html
12
Chapter 2- Literature Review |
The VoIP-PSTN gateways allow appropriate conversions between the two networks to take
place.
2-3-2-3 Phone to Phone
In its simplest form, voice call is made from a PSTN telephone to another PSTN telephone. Voice
traffic originates and terminates in PSTN while it traverses through the Internet. This method is
fashionable for individual and residential use. Figure 2-4 illustrates this model.
Figure 2-4 VoIP implementation: Phone-to-Phone
A pure VoIP network solution can be employed for inter-site communication in businesses. In
its simplest form, a call is made from an IP phone to another IP phone completely through the
site’s IP network; PSTN is not involved.
IP phones are directly connected to networks via patch cables or wireless links. They have IP
addresses and they communicate with VoIP servers through IP networks. In enterprises, IP
Private Branch eXchange (PBX) handles inter-site communication. Figure 2-5 illustrates a simple
pure VoIP implementation.
Figure 2-5 Pure VoIP implementation: IP Phone-to-IP Phone
13
Chapter 2- Literature Review |
In practice, enterprises, especially those who have multiple sites, are more likely to employ a
variety of telephony network options for placing calls. This includes PSTN, the public Internet
and private Wide Area Network (WAN) connection or Virtual Private Network (VPN). In this
scenario, the IP PBX handles both intra-enterprise VoIP calls and PSTN call routing support. VoIP
gateways provide connectivity between VoIP and PSTN. Figure 2-6 illustrates multi-site
enterprise VoIP connection options.
PSTN
IP PBX
IP PBX
Phone
Phone
Computer
Computer
Internet
IP
Phone
Gateway/Router
IP
Phone
Fax
Site 1
VPN
VPN
Private IP Network
VPN
Gateway/Router
Fax
Site 2
Private IP Network
Figure 2-6 Multi-site enterprise VoIP implementation
2-4 VoIP Technology
VoIP refers to a class of technologies that enables multimedia (text6/voice/video) traffic to be
transferred over IP networks. The fundamental concept of VoIP is the digitization and
packetization of the human voice. The speech (voice analogue signals) is converted into digital
signals by appropriate coders/decoders and it is then broken into packets and transferred over
Internet Protocol (IP)-based networks like the Internet.
6
Instant messaging (IM), which is a real time text base network communication method, is considered to be a VoIP service. IM
is distinguishable from on line text chatting. Via IM only specified known users communicate, while via on line text chatting in
addition to known users often anonymous users communicate. In addition to IM, fax is also considered to be a VoIP service.
14
Chapter 2- Literature Review |
The procedures involved in placing voice conservation over VoIP can be broadly categorized in
the following four stages: signaling, encoding/decoding, transport, and gateway. These are
described in more detail in the following sub-sections.
2-4-1 Signaling
In the signaling stage, calls between end nodes are established, maintained, and terminated.
The details of the calls (codec type, packet size, etc.) are negotiated and agreed by the end
nodes.
Signaling protocols carry out these tasks. Session Initiation Protocol7 (SIP) and H.3238 are the
two most common VoIP signaling protocols. The former was specified by the Internet
Engineering Task Force (IETF)9, whereas the latter was developed by ITU-T10.
In-depth description of SIP is provided in Schulzrinne and Rosenberg (1998b),Schulzrinne and
Rosenberg (2000), while H.323 is discussed in detail in Thom (1996) and Hong and Mouchtaris
(2000). Comparisons of SIP and H.323 can be found in Schulzrinne and Rosenberg (1998a),
Glasmann, Kellerer and Muller (2001), Glasmann, Kellerer and Muller (2003), and Basicevic,
Popovic and Kukolj (2008).
7
SIP was first defined in March 1999 by RFC 2543 (http://tools.ietf.org/html/rfc2543), and was then upgraded in June 2002 by
RFC 3261 (http://www.ietf.org/rfc/rfc3261.txt). The latter RFC is one of the longest standards (269 pages) defined by Internet
Engineering Task Force (IETF).
8
ITU-T recommendation H.323 (version 1) was approved on 8 November 1996 under the World Telecommunication
Standardization Conference (WTSC) Resolution No. 1 and its title was ‘Visual telephone systems and equipment for local area
networks which provide a non-guaranteed quality of service’. This version was revised and the second version titled ‘Packetbased multimedia communications systems’ (which reflected more its functionality and was consistent with its expanded scope)
was approved on 6 February 1998. Over the past decade H.323 has been superseded by more recent versions. The last version
of H.323 (ITU-T H.323 v7) was approved on 14 December 2009 with the same title as the second version.
9
www.ietf.org
ITU-T is described in the foreword section (page iii) of the ‘Recommendation H.323 (12/09)’ (http://www.itu.int/rec/T-RECH.323-200912-I/en) as:
10
‘ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of
telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. The
ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with
a view to standardizing telecommunications on a worldwide basis.’
15
Chapter 2- Literature Review |
2-4-2 Encoding/Decoding
The converting and compressing of analog voice to digital data is accomplished by codecs in the
encoding/decoding stage. The term codec11 is derived from the combination of coder/decoder.
Based on Nyquist theorem, codecs convert analog voice into digital signals. According to
Nyquist theorem, analog voice must be sampled at a minimum of more than twice its frequency
(Broesch 1997). Since generally speech content is less than 4000 Hz (Davidson & Peters 2000),
sampling rate of 8000 times per second is required.
G.711, the most widely used codec in PSTN, employs pulse code modulation (PCM) algorithm
for sampling purposes. PCM uses eight bits per sample and therefore requires (8000 Hz x 8 bit =
64000 bps = 64 kbps) 64 kbps bandwidth. Currently, this amount (64 kbps) is considered to be a
baseline unit in terms of bandwidth requirement in VoIP networks.
Assuming G. 711’s packet interval (gap between transmitted packets) is 10 ms (1/100th second),
(64000 / 100 = 640) 640 bits (80 bytes) of G.711 data (voice data) is placed in each packet.
Each codec employs a compression algorithm and based on the algorithm utilizes network
bandwidth. Table 2-1 compares some codecs.
Codec
Algorithm
Usual Rate (kb/s)
G.711
PCM
64
G.726
ADPCM
32
G.729a
CS-ACELP
8
G.723.1
MP-MLQ
6.3
G.723.1
ACELP
5.3
iLBC
LPC
15.2
iLBC
LPC
13.33
Table 2- 1 Audio Codecs
11
In some publications the term VOCODER (VoIP Coders) is used to refer to codec. However, codec is more prevalent.
16
Chapter 2- Literature Review |
Many audio codes are available. The G-series12 (G.xxx) codecs which are defined by
International Telecommunication Union13 -Telecommunication Standardization Sector (ITU-T)14
are fashionable in VoIP networks. iLBC15 (Internet Low Bitrate Codec) which is a free audio
codec is currently used by popular VoIP PC-to-Phone providers, such as Skype and Yahoo!
Messenger (Davidson et al. 2006). Furthermore, G.729 or G.723 codec is commonly used over
WAN links since they offer a high compression rate while preserving reasonable speech quality
(Hanes & Salgueiro 2008, p. 131). Codecs are discussed in detail in Karapantazis and Pavlidou
(2009, pp. 2055-2059).
2-4-3 Transport
After a call is established, actual voice traffic is transmitted between the end nodes. The
Internet Protocol16 (IP) is used to transmit data from sources to destinations in packetswitched networks. Both sources and destinations are identified by IP addresses. As shown in
Figure 2-7, the IP header contains source and destination address. Best routes between the
source and destination nodes are determined by routing protocols.
Version
IHL
Type of Service
Total Length
Identification
Flags
Fragment Offset
Time to Live
Protocol
Header Checksum
Source Address
Destination Address
Options
Padding
Data (Variable)
Figure 2-7 IP header
12
http://www.itu.int/net/itu-t/sigdb/speaudio/Gseries.htm
http://www.itu.int/en/pages/default.aspx
14
http://www.itu.int/ITU-T
15
http://www.ilbcfreeware.org
16
IP was defined in 1981 by RFC 791 (http://datatracker.ietf.org/doc/rfc791/) which is based on six earlier versions of IP
specification.
13
17
Chapter 2- Literature Review |
IP is employed by local network protocols, such as Transmission Control Protocol (TCP) and
User Datagram Protocol (UDP) to carry datagrams17 (packets). Therefore, UDP and TCP run on
top of IP as the data portion of an IP datagram. Generally, TCP/IP is used when reliability is the
main concern and UDP/IP is employed when speed of data delivery is of interest.
TCP18 guarantees packet delivery by providing acknowledged and flow-controlled service.
Therefore, it is generally the case that TCP is used in the signaling stage to ensure the reliability
of call establishment. However, due to the time sensitive nature of VoIP traffic, it is not feasible
to use TCP to carry the actual voice traffic.
Since VoIP traffic is delay sensitive, controlling latency in VoIP networks is more important than
controlling packet loss. Therefore; UDP19, which does not wait for acknowledgment of the
delivered packets and does not require prior negotiations to establish special transmission
channels, is used to carry voice traffic. UDP is a simple protocol which its header contains only
four fields as depicted in Figure 2-8.
Source Port
Length
Destination Port
Checksum
Figure 2-8 UDP header
However, since UDP does not provide the information that the receiving nodes require to
correctly reassemble the digitized voice packets into a voice signal, Real-time Transport
Protocol (RTP) is employed in conjunction with UDP. Therefore, VoIP traffic is carried with an
RTP/UDP/IP packet header. In other words, the actual voice data is transmitted by RTP packet
17
In the literature, datagram and packet are often considered to be synonymous. However, datagram refers to unreliable
packet delivery. For instance, since UDP and IP do not guarantee packet delivery, UDP/IP packets are called datagrams.
18 TCP was defined in 1981 by RFC 793 (http://datatracker.ietf.org/doc/rfc793/) which is based on nine earlier versions of TCP
specification.
19 UDP was defined in 1980 by RFC 768 (http://tools.ietf.org/html/rfc768).
18
Chapter 2- Literature Review |
which is carried as data by the UDP datagram, and UDP itself is encapsulated by IP. Figures 2-9
and 2-10 illustrate the simplified layout of RTP/UDP/IP packet.
IP
header
IP Payload
UDP
header
UDP Payload
IP
header
RTP
header
RTP Payload
RTP
UDP
header header
Voice Data
Codec Payload
(Actual Voice Data)
Figure 2-9 RTP/UDP/IP packet
Figure 2-10 RTP/UDP/IP packet
RTP20 provides the necessary information, such as orders of the arriving packets and the
variation of consecutive packets arrival time. The information is provided by the sequence
number and timestamp field of RTP’s header (see Figure 2-11).
V=2
P
X
CC
M
PT
Sequence Number
Timestamp
Synchronization Source (SSRC) identifier
Sontributing Source (CSRC) identifiers
………
Figure 2-11 RTP header
However, RTP does not guarantee on-time delivery, reliability, Quality of Service (QoS) and
resource reservation, and relies on its associated control protocol, Real Time Control Protocol
(RTCP), for providing these. In fact, RTCP21 extends RTP’s functionality, particularly by
20
Packet structure and basic functions of RTP was first defined in 1996 by RFC 1889 (http://www.ietf.org/rfc/rfc1889.txt) and
then it was updated in 2003 by RFC 3550 (http://tools.ietf.org/html/rfc3550).
21 RTCP was first defined in 1996 by RFC 1889 (http://www.ietf.org/rfc/rfc1889.txt) and then it was updated in 2003 by RFC
3550 (http://tools.ietf.org/html/rfc3550).
19
Chapter 2- Literature Review |
monitoring QoS. This is done by receiving feedback on the quality of the delivered data which is
conveyed by RTCP packets periodically sent by participants in an RTP session.
2-4-3-1 Bandwidth efficiency
With advances in network technologies, more bandwidth is available now than in the past.
However, bandwidth is still considered to be a premium resource, especially in wireless VoIP
networks. Therefore, significant efforts have been made to minimize bandwidth consumption
of network applications. The main techniques used to increase bandwidth efficiency in VoIP
networks are speech compression codecs, Voice Activity Detection (VAD) and header
compression.
2-4-3-1-1 Speech compression codecs
The speech compression codecs technique employs appropriate codecs that require less
bandwidth. The consumed bandwidth per call much depends on the selected codec and
number of voice samples per packet. Davidson et al. (2006 p. 178) describe the correlation
between bandwidth consumption and packet sizes.
Packetization efficiency which refers to the number of voice samples in an IP packet is an
important factor. On the one hand, placing less voice samples in an IP packet is inefficient since
the header overhead will increase. On the other hand, when more voice samples in an IP packet
are placed, the packet becomes larger, which this can lead to packet loss and the increase of
end-to-end delay. The number of voice samples that is sent per packet depends on the
employed codec. For example, G.711 usually takes 80 bytes of Voice data while G.729 takes 20
bytes (Oouch et al. 2002).
Karam and Tobagi (2001) investigated the impact of packet size on bandwidth utilization and
voice delay for G.729A, G.723.1 and G.711 codecs. It was concluded that 30 ms of speech for
20
Chapter 2- Literature Review |
both G.729.A and G.723.1 with packet size of 30 bytes and 20 bytes respectively, and 10 ms
speech for G.711 with packet size of 80 bytes, provide a reasonable trade-off between efficient
network utilization and low voice delay. In another study, Oouch et al. (2002) studied the effect
of packet size on voice quality under different network conditions for G.711 and G.729 codecs.
They revealed that voice quality is not affected by the size of the packet when packet loss rates
are very low. However, smaller packets are superior to larger ones in terms of voice quality
when packet loss rates are moderate or high.
2-4-3-1-2 Voice Activity Detection
Generally, in conversations, one speaks and one listens. In addition, there are breaks and
pauses in normal conversations. This means that about 50 percent of the dedicated bandwidth
for voice traffic transmission is wasted. According to Beritelli et al (cited in Chen et al. 2010), a
typical conversation has a speech to non-speech ratio of forty to sixty.
Voice Activity Detection (VAD) is a technique that enables the wasted bandwidth in VoIP
networks be used for other purposes. This is achieved by detecting the voiced and non-voiced
segments of analog sound signals.
VAD function can be broadly divided into two modules, speech analysis and decision module
(Huang & Lin 2009). The former extracts acoustic parameters from the input sound signal in
order to distinguish speech from non-speech segments, while the latter based on the extracted
parameters and decision rules determines whether the input signal is speech or noise (Chen et
al. 2010). Quality of speech, level of compression and computational complexity of different
VoIP VDA algorithms are compared in Venkatesha Prasad et al. (2002).
21
Chapter 2- Literature Review |
2-4-3-1-3 Header compression
The voice packets usually have a payload of 20 to 60 bytes, depending on the employed codec
(Karapantazis & Pavlidou 2009) and the IP version 4 (IPv4)/UDP/RTP header is 40 bytes. . It
consists of an IP header of 20 bytes, an UDP header of 8 bytes and a RTP header of 12 bytes,
while for IP version 6 (IPv6) this will be 60 bytes since the IPv6 header is 40 bytes. This means
that bandwidth is used to transfer VoIP packets in which the payload is about the same size or
even smaller than the header. A simplified form of IPv4/UDP/RTP and IPv6/UDP/RTP headers is
illustrated in Figures 2-12 and 2-13.
20 bytes
8 bytes
12 bytes
IPv4
header
UDP
header
RTP
header
Voice Data
Payload
Headers
40 bytes
20 - 60 bytes
Figure 2-12 IPv4/UDP/RTP headers (40 bytes)
40 bytes
IPv6
header
8 bytes
UDP
header
12 bytes
RTP
header
Voice Data
Headers
Payload
60 bytes
20 - 60 bytes
Figure 2-13 IPv6/UDP/RTP headers (60 bytes)
The header information including the source and destination addresses, type of service,
protocol identifiers, etc. are essential for successful end-to-end transfer of packets over
multiple links. However, in order to improve bandwidth efficiency IP/UDP/RTP headers can be
compressed on a hop-by-hop basis. This means that the header of VoIP packets is compressed
before being transferred on a link and it is decompressed at the other end of the link. According
22
Chapter 2- Literature Review |
to Casner and Jacobson (1999), an IP/UDP/RTP header can be compressed to 2-4 bytes. Header
compression is depicted in Figure 2-14.
20-40 bytes
8 bytes
12 bytes
IPv4/IPv6
header
UDP
header
RTP
header
Voice Data
Payload
Headers
40 - 60 bytes
20 - 60 bytes
IPv4/IPv6/UDP/RTP
header compression
Voice Data
Headers
2-4 bytes
Payload
20 - 60 bytes
Figure 2-14 IPv4/IPv6/UDP/RTP header compression
The obvious advantage of header compression is efficient bandwidth utilization. However,
improving the payload efficiency (the ratio of voice data (payload)/total packet size), which
leads to shorter end-to-end delay, is a significant benefit of employing header compression.
Since the IPv4/UDP/RTP header is 40 bytes, to have 50% payload efficiency we therefore need a
payload of 40 bytes (40 bytes/80 bytes=50% payload efficiency). This is depicted in Figure 2-15.
20 bytes
8 bytes
12 bytes
IPv4
header
UDP
header
RTP
header
Voice Data
Headers
Payload
40 bytes
40 bytes
Figure 2-15 50% payload efficiency
23
Chapter 2- Literature Review |
According to Goode (2000), it takes 5 ms to accumulate 40 bytes at 64kb/s while at 8kb/s it
takes 40 ms to accumulate 40 bytes. Therefore, low payload efficiency, especially in conjunction
with low bit rate codecs, will increase the end-to-end delay. The following equation is proposed
by Goode (2000, p. 1499):
Codec output rate (kb/s)
The call bandwidth requirement (kb/s)
BW = R + H/S
Payload sample size (milliseconds)
Header size (bits)
Low BW leads to long packetization delay and more complex codec. To achieve the
requirements for reasonable call bandwidth, reasonable codec complexity and an acceptable
packetization delay, a trade-off must be made (Goode 2000, p. 1499).
Header Compressions is discussed in (Karapantazis & Pavlidou 2009; Casner & Jacobson 1999;
Degermark, Nordgren & Pink 1999; Koren et al. 2003; Engan, Casner & Bormann 1999; Engan,
Casner & Bormann 2003; Liu et al. 2001).
24
Chapter 2- Literature Review |
Header Compressions methods such as IP Header Compression (IPHC)22, Compressed Real-time
Transport Protocol (CRTP)23, Enhanced CRTP24 and RObust Header Compression (ROHC)25 are
defined in deferent Request for Comments (RFCs)26.
2-4-4 Gateway
Direct connection between packet switched network (VoIP) and circuit-switched networks
(PSTN) is not feasible, because in addition to voice data, signaling data is also exchanged
between VoIP and PSTN networks. In PSTN, the Signaling System Number 7 (SS7) is used, while
in VoIP, SIP and H.323 are the most common signaling protocols.
22
IP Header Compression (IPHC) is described in RFC 2507- ‘IP Header Compression’ (http://www.faqs.org/rfcs/rfc2508.html) in
1999. IPHC can be applied to multiple IP headers and TCP/UDP headers on a hop-to-hop basis. The mechanism for TCP header
compression in RFC 2507 is similar to the proposed technique in 1990 in RFC 1144 – ‘Compressing TCP/IP Headers for LowSpeed Serial Links’ (http://www.faqs.org/rfcs/rfc1144.html).
23
Compressed Real-time Transport Protocol (CRTP) is described in RFC 2508 – ‘Compressing IP/UDP/RTP Headers for LowSpeed Serial Links’ in 1999 (http://www.faqs.org/rfcs/rfc2508.html). By employing CRTP, IP/UDP/RTP headers can be
compressed to 2-4 bytes.
24
Enhanced CRTP is described in RFC 3545 – ‘Enhanced Compressed RTP (CRTP) for Links with High Delay, packet Loss and
Reordering’ in 2003 (http://www.faqs.org/rfcs/rfc3545.html). This document describes a header compression method for point
to point links with packet loss and long delays. It is based on CRTP which is described in RFC 2508 – ‘Compressing IP/UDP/RTP
Headers for Low-Speed Serial Links’. CRTP does not work well in networks with packet loss and long delays.
25
RObust Header Compression (ROHC) described in RFC 3095 – ‘RObust Header Compression (ROHC): Framework and four
profiles: RTP, UDP, ESP, and uncompressed’ in 2001 (http://www.faqs.org/rfcs/rfc3095.html). The abstract of this RFC states:
This document specifies a highly robust and efficient header compression scheme for RTP/UDP/IP (Real-Time
Transport Protocol, User Datagram Protocol, Internet Protocol), UDP/IP, and ESP/IP (Encapsulating Security
Payload) headers.
ROHC header compression is proposed for links with significant error rates and long round-trip times.
26
RFC 2509 – ‘IP Header Compression over PPP’ (http://www.faqs.org/rfcs/rfc2509.html) describes an option for negotiating
the use of IPHC & CRTP over the Point-to-Point Protocol. The authors in a more recent version in 2003 in RFC 3544 – ‘IP Header
Compression over PPP’ (http://www.faqs.org/rfcs/rfc3544.html) defined extensions to the PPP Control Protocols for
improvement in IPHC & CRTP usage over the Point-to-Point Protocol.
25
Chapter 2- Literature Review |
During the gateway stage, protocol translation and media transcoding between VoIP and PSTN
are provided. Consequently, PSTN calls can be completed through VoIP networks and vice
versa. In fact, connectivity between the PSTN (circuit switched network) and VoIP (packet
switched network) is navigated through the VoIP/PSTN gateway. This is illustrated in Figure 216.
Figure 2-16 VoIP/PSTN gateway
Building on this theme, VoIP/PSTN gateways transfer voice and fax data, in real-time, between
VoIP and PSTN networks and their functionality can be categorized as signaling gateway and
media gateway. Signaling gateway provides interworking of signaling between VoIP/PSTN
networks, while media gateway compresses, packetizes and delivers voice packets to the VoIP
network; its procedure is the exact opposite of the PSTN network (Karapantazis & Pavlidou
2009).
26
Chapter 2- Literature Review |
2-5 Security/privacy
The Oxford Advanced Learner’s Dictionary27 defines security as ‘the activities involved in
protecting a country, building or person against attack, danger, etc. and it defines privacy as
‘the state of being alone and not watched or disturbed by other people’.
There is a relationship between security and privacy. From the VoIP perspective, a simple
definition is that privacy is having a communication that is free from unauthorized access and
security means maintaining this privacy.
.
VOIPSA28 provides a more general definition of security and privacy. Privacy is defined as:
The Privacy Concept is the privilege of all people to have their communication systems and
content free from unauthorized access, interruption, delay or modification.
And security is defined as:
1) the right to protect privacy, 2) a method of achieving privacy and 3) ways to keep
communication systems and content free from unauthorized access, interruption, delay or
modification.
27
Oxford Advanced Lerner’s dictionary – 7th edition – the software version
The Voice Over IP Security Alliance (VOIPSA) is an non-profit organization which according to its website
(www.voipsa.org/About) their ‘… aims [are] to fill the void of VoIP security related resources through a unique collaboration of
VoIP and Information Security vendors, providers, and thought leaders.’ and their ‘… mission is to drive adoption of VoIP by
promoting the current state of VoIP security research, VoIP security education and awareness, and free VoIP testing
methodologies and tools.’
28
27
Chapter 2- Literature Review |
2-5-1 VoIP/PSTN security: a comparison
It is generally assumed that PSTN is more secure than VoIP. Basically, PSTN security is based on
the physical security of the core network equipment and the related components on the
customer's premises. This model known as ‘physical wire security’ seems to be efficient enough
for PSTN since attacks which require physical access usually do not scale in a distributed
environment. However, an eavesdropper can wiretap PSTN by physically accessing telephone
lines which is much easier than to wiretap VoIP systems. Security issues in PSTN are discussed
in (Porter et al. 2006a, pp. 114-118).
On the other hand, the nature of VoIP security is such that it is not based on wire security.
However, by gaining access to traffic on a VoIP network that is not well secured, VoIP packets
could be captured, modified, reassembled or controlled to overturn the security behavior. VoIP
systems may be attacked by non-specialists using free VoIP-sniffers such as Vomit29 and
VoiPong30, but hacking PSTN generally requires specialist knowledge.
2-5-2 VoIP security
For data to be transmitted over IP networks, a large number of parameters have to be
configured. Many of these parameters are configured dynamically and since a wide range of
configurations is involved, networks suffer from potentially vulnerable points. Generally, VoIP
uses the existing IP networks and therefore inherits their vulnerabilities. Adding voice traffic to
IP networks complicates security issues and introduces a range of vulnerabilities. This is
because VoIP requires VoIP-specific configurable parameters in addition to the existing ones in
the underlying IP networks, such as call processing components. These parameters change
dynamically each time VoIP services are started or restarted.
29
Voice Over Misconfigured Internet Telephones (vomit) is a completely free utility (even commercial use of it is permitted)
that converts VoIP conversations (only G.711 encoded) on Cisco IP phones into wave files (http://vomit.xtdnet.nl/).
30
VoIPong is an open source utility which converts VoIP conversations (only G.711 encoded) into wave files
(http://www.enderunix.org/voipong/).
28
Chapter 2- Literature Review |
Providing integrated services (messenger, email and web) in addition to rich media (voice,
video, text and fax) (Patrick 2009) and VoIP-PSTN interconnection, are other factors which
complicate VoIP security.
From a security perspective, VoIP is not just another application attached to the IP network.
Although VoIP packets traverse IP network routes and are distributed between the IP networkconnected machines, the network components including switches, routers, firewalls and
network address translation (NAT), must be VoIP aware, so that they can provide specific VoIP
security features. For example, ordinary firewalls are generally not able to protect VoIP systems
from VoIP specific application layer attacks, such as malformed H.323 or SIP messages, due to
the fact that these firewalls cannot detect such attacks. To address these kinds of flaws, VoIP
security devices/modules and systems, such as Session border controllers (SBCs) 31, should be
employed.
VoIP security has been discussed from different perspectives. VoIP general security issues, VoIP
providers’ security issues, SIP/H.323 security, Man-In-The-Middle (MITM) and Denial of Service
(DoS), Spam over Internet Telephony (SPIT) and Biometric encryption are discussed in the
following sub-sections.
2-5-2-1 General VoIP security issues
Studies in this category generally do not contain in-depth technical discussions. They only
provide a broad overview of VoIP security, guidelines, and a classification of vulnerabilities and
possible threats and attacks. Therefore, they are not informative for professionals, but are
valuable literature for new researchers in the field of VoIP security.
31
According to the Gartner Report, ‘IT Market Clock for Enterprise Networking Infrastructure, 2010’, Session border controllers
(SBCs) provides ‘… a secure, controlled connection for points between networks that provide interactive, Internet Protocol (IP)based communications like Session Initiation Protocol (SIP)-based unified communications (UC)’. Furthermore, in another
Gartner Report, ‘How to Leverage SIP Trunks, Session Border Control and Session Management for Cost Savings and UC
Deployment’ it is stated that ‘ Session border controllers (SBCs) can reduce SIP-based denial of service (DoS) threats that
originate from within and outside an organization…’ and ‘… improve[s] enterprise communications security,… , operational
efficiency and reliability’.
29
Chapter 2- Literature Review |
General VoIP security issues have been addressed in different papers (Dantu et al. 2009;
Epstein 2009, pp. 323-347; Gupta & Shmatikov 2007; Butcher, Xiangyang & Jinhua 2007;
Douglas & Tom 2004). Namely, Kuhn, Walsh and Fries’ (2005) research in this area is notable.
This study is a special report from the US National Institute of Standards and Technology (NIST)
which provides security recommendations for VoIP implementation. In this research, the VoIP’s
risks, threats and vulnerabilities are analyzed along with the encryptions that can be applied.
Further, the effect of securing VoIP on QoS is discussed in depth. Similarly, Walsh and Kuhn’s
(2005) study discusses the overall security aspects of VoIP and avoids technical details. It
concentrates on the need for new technologies to combat security breaches.
2-5-2-2 VoIP providers’ security issues
The studies in this category evaluate security issues of VoIP providers. Different security
features concerning the popular VoIP providers are analyzed and sometimes are compared.
Skype, due to its widespread usage, has drawn more attention than other VoIP providers.
Skype security has been discussed from different angles. For example, Simon and Slay (2010)
discuss Skype security from the forensic perspective. Their study shows that it is feasible to
exploit the physical memory of the computer on which Skype was running, in order to recover
the digital evidence. Moreover, Zhu and Fu (2010) address Skype passive traffic analysis attacks
and show that privacy of Skype calls can be compromised by launching passive traffic analysis
attacks.
In Sengar et al. (2010) a transparent packet marking scheme is presented for tracing Skype
packets in order to disclose the path and the origins and destination of a Skype call.
Additionally, Wang, Chen and Jajodia (2005) investigate Skype encryption and show that when
a unique watermark is embedded into the encrypted flow, it is feasible to trace calls and launch
a timing attack. An overview of Skype security is addressed in Piccard (2006, pp. 103-121), and
Porter and Gough (2007, pp. 253-262).
30
Chapter 2- Literature Review |
Some weighty papers have surveyed security issues of other dominant VoIP providers. For
instance, the study conducted by Zhang et al. (2009a) shows that a remote attacker who knows
the IP address and phone number of a Vonage (residential VoIP provider in the US) client is able
to eavesdrop and hijack calls by launching a DNS spoofing attack. Although Ahmed and Shaon’s
(2009) research mainly concentrates on comparing the QoS in different VoIP providers (Skype,
GTalk, and Gizmo), the compared security criteria amongst them are useful.
31
Chapter 2- Literature Review |
2-5-2-3 SIP/H.323 security
VoIP comprises different components with a range of protocols where each has its own security
concerns. H.323 and Session Initiation Protocol (SIP) are the two most common signaling
protocols used in VoIP’s signaling stage (Basicevic, Popovic & Kukolj 2008; Glasmann, Kellerer &
Muller 2003; Glasmann, Kellerer & Muller 2001). In some papers VoIP security is discussed from
its signaling protocol’s perspective.
In the literature, SIP security has drawn more attention than H.323 security. This is due to the
adoption of SIP for IP Multimedia Subsystem (IMS) 32 in 3G (3GPP) and Next Generation
Networks (NGNs)33 (Geneiatakis et al. 2006).
32
IP multimedia subsystem (IMS) is an architecture which is designed to provide IP multimedia communication services.
Telecommunication service providers employ IMS to deliver interactive multimedia service to their customers. IMS
encompasses circuit-switched communication networks and packet-switched networks and uses VoIP technology and SIP
standard (Porter et al. 2006b, p. 500 ). In other words, IMS combines telecommunication technologies with wireless and wired
networks in order to provide the All-IP environment to deliver multimedia services in 3G and more advanced networks such as
3.5G and 4G. IMS is discussed in detail in (Handa 2009, pp. 1-24; Chen et al. 2008 and Martínez Perea 2008, pp. 501-540).
IP multimedia subsystem (IMS) was proposed by Third Generation Partnership Project (3GPP) <http://www.3gpp.org> to
provide IP multimedia network for telecom operators. 3GPP is the IMS standardization body. IMS is introduced in 3GPP
specifications release 5 (Rel-5) and has been further developed in latter releases (now Rel-11). IMS architecture and main flows
are defined in <http://www.3gpp.org/ftp/Specs/html-info/23228.htm> and IMS service requirements are addressed in
<http://www.3gpp.org/ftp/Specs/html-info/22228.htm>.
33
The term Next Generation Network (NGN) is generally used to indicate the shift to a more advanced network. These
networks have higher broadband speed connections and have migrated from circuit-switched communication networks (PSTN)
to packet-switched IP networks, and provide integrated services on a single network (Sarrocco & Ypsilanti 2007). NGN in
addition to providing the existing fixed and mobile telephony services provides multimedia (IPTV, etc.) and content delivery
(audio/video streaming, etc… ) services, and extends IMS to support additional technologies (Baroncelli et al. 2010). NGN is
discussed in Richardson (2007), pp. 207-224, Mohapatra (2009) and Sarrocco and Ypsilanti (2007).
A detailed definition of NGN is provided by ITU-T. According to ITU-T Recommendation Y.2001 (12/2004) p. 2, NGN is defined
as:
A packet-based network able to provide telecommunication services and able to make use of multiple broadband, QoS-enabled
transport technologies and in which service-related functions are independent from underlying transport related technologies. It
enables unfettered access for users to networks and to competing service providers and/or services of their choice. It supports
generalized mobility which will allow consistent and ubiquitous provision of services to users.
International Telecommunication Union - Telecommunication Standardization Sector (ITU-T) <http://www.itu.int/net/ITUT/info/Default.aspx> have produced two fundamental recommendations about NGN, ITU-T Recommendation Y.2001
(12/2004)- General overview of NGN <http://www.itu.int/rec/T-REC-Y.2001/e> and ITU-T Recommendation Y.2011- General
principles and general reference model for next generation networks <http://www.itu.int/rec/T-REC-Y.2011/e>.
32
Chapter 2- Literature Review |
Some studies focus on a specific security issue of SIP/H.323 signaling protocols, while some
studies survey general security vulnerabilities of these protocols. For example, Al-Allouni et al.
(2009) propose two flooding attack metrics, Attack Time and Attack Rate in order to evaluate
SIP flooding attack. Ge et al. (2009) concentrate on timing attack which aims to reveal the
calling history of SIP-based VoIP systems. In contrast, Geneiatakis et al. (2006) provide a
comprehensive survey on SIP’s security and analyze possible threats and attacks. Similarly,
Geneiatakis and Lambrinoudakis (2007) and Geneiatakis et al. (2005) discuss SIP security
vulnerabilities in much detail in order to evaluate security and deploy intrusion detection
systems.
2-5-2-4 Man-In-The-Middle (MITM) and Denial of Service (DoS)
Man-In-The-Middle (MITM) and Denial of Service (DoS) are two traditional attack types which
can be applied to either the VoIP or underlying IP network.
MITM34, which is also known as session hijacking attacks or bucket-brigade attack, is a type of
attack that requires attackers to have access to network traffic. By sniffing and eavesdropping
on the packets that come across a network, attackers gain access to a legitimate connection
between two parties. According to Rufi (2007, p. 779), a MITM attack might lead to ‘…theft of
information, hijacking of an ongoing session to gain access to private network resources, traffic
analysis to derive information about a network and its users, Denial-of-Service (DoS), corruption
of sent data, and introduction of new information into network sessions.’
The effects of such MITM attacks might be more serious than DoS to VoIP users since they
would in all likelihood not notice the attack. It is generally the case that these attacks’ main
34
The origin of the term “Man in the middle” is derived from the ball game where two players try to pass a ball to each other
while one player between them attempts to catch it
(http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci499492,00.html).
33
Chapter 2- Literature Review |
ramification is a major risk to data integrity, such as identity theft and call redirection (Arul,
Shanmugam 2009).
Wang et al. (2008) demonstrate that the US leading VoIP providers (Vonage, AT&T and Gizmo)
are vulnerable to MITM attack. In their scenario when a user dials a number the VoIP call is
diverted to the bogus interactive voice response or bogus representative. Since the user has
dialed the correct number, s/he is confident that the interactive voice response or
representative is genuine. Therefore, s/he might be deceived and emit sensitive information
such as a credit card number. In a similar vein, Zhang et al. (2009a) and Zhang et al. (2009b)
discuss MITM attacks on VoIP networks.
DoS attack refers to attacks which attempt to make a computer resource unavailable to its
intended users. Sisalem, Kuthan and Ehlert (2006) state that SIP-based VoIP is vulnerable to DoS
attacks which aim to put a huge load on memory and CPU of VoIP servers. Al-Allouni et al.
(2009) classify VoIP potential DoS attacks into three general classes: Message Flows Attacks,
Flooding Attacks and Malformed Message Attacks. These divisions have been further subclassified.
2-5-2-5 Spam over Internet Telephony
Spam refers to unsolicited bulk messages that are sent through computer networks. A widely
known type of spam is e-mail spam and often the term ‘spam’ has only referred to e-mail spam.
However, spam can be applied to any medium which is being abused by unwanted messages
such as mobile phone messaging spam.
Spam over Internet Telephony (SPIT) is an emerging kind of spam (Mu et al. 2010; Gritzalis &
Mallios 2008; Quittek et al. 2008) that constitutes a potential threat to VoIP. It is more severe
than email spam due to its attack nature, and consequently VoIP systems require a real-time
defense mechanism.
34
Chapter 2- Literature Review |
Different methods have been proposed for detecting and preventing SPIT. Quittek et al. (2007)
propose a SPIT prevention system which distinguishes human callers from automatic SPIT
generators based on checking typical human communication patterns. Similarly, Huang, Yu and
Feng’s (2009) SPIT prevention system works based on voice activity analysis.
Yu-Sung et al.’s (2009) model detects spam in VoIP calls by employing clustering, a data mining
technique. Based on the call parameters, calls with similar features are placed in a cluster for
SPIT or legitimate calls. Call features are derived from the signaling and media protocols. For
more accurate clustering, this approach may use users’ feedback to mark calls as non-SPIT or
SPIT.
2-5-2-6 Biometric encryption
Employing biometric encryption for securing VoIP is an area which has not been widely
explored. In the IT security context, biometric refers to the measurement of physiological and
behavioral characteristics for authentication purposes. Fingerprints and voice are instances of
physiological measurements. Arul and Shanmugam (2009) propose a cryptographic system for
securing VoIP which generates the private key from fingerprints. This key is used in the process
of encrypting and decrypting VoIP traffic. Kopsidas, Zisiadis and Tassiulas (2006) propose a
protocol based on biometrics to provide a secure end-to-end VoIP communication. The Voice
Interactive Personalized Security (VoIPSEC) protocol employs a two-level verification scheme
where in the first level voice and in the second level video biometry data are used. Similarly,
Zisiadis, Kopsidas and Tassiulas (2007a) and Zisiadis, Kopsidas and Tassiulas (2007b) discuss
VoIPSEC and the usage of biometry data.
2-5-3 Myths about VoIP security
Myths surrounding VoIP have been discussed in Cherry (2005) and Sundquist and Service
(2006). In both studies the myth about VoIP security has been described alongside other myths.
35
Chapter 2- Literature Review |
However, Patrick (2009, pp. 14-15) merely addresses the myths about VoIP security and cast
light on them. These myths are summarized in Table 2-2.
Myth
Reality
1- Traditional phone systems (PSTN) are more
secure than VoIP systems
The biggest concern in relation to this myth is wiretapping.
It has to be noted that wiretapping PSTN is much easier
than wiretapping VoIP. This is because an eavesdropper can
wiretap PSTN by physically accessing telephone lines which
are not well secured (like outside buildings). However, an
eavesdropper, to be able to sniff voice packets has to locate
his sniffing tool on the same broadcasting domain as the
VoIP devices. This is very hard for external hackers to do
due to the fact that VoIP devices are located in places which
are either well secured (network equipment’s in IT centers)
or at least have some level of security (IP phones/cables at
offices or residences.
2- To protect network and VoIP end users
against threats, strict encryption and
authentication is sufficient
It is obvious that encryption and authentication is crucial
for securing networks; however, some advanced attackers
get through by impersonating, and then bypassing the
authentication and encryption process.
3- Securing underlying IP networks can secure
VoIP networks as well
From the network layer perspective, securing the IP
network will partially protect VoIP data. However, from the
application layer perspective this does not apply. This is
because security devices like firewalls generally are not able
to detect VoIP specific application layer attacks, such as
malformed H.323 or SIP messages which target the servers.
Security devices should be VoIP aware and this can be
achieved by employing VoIP security devices/modules. To
retain a secure VoIP system, both IP network and VoIPspecific security issues must be addressed.
Table 2-2 The three myths about VoIP security
36
Chapter 2- Literature Review |
2-5-4 VoIP Threat Taxonomy
Vulnerabilities and threats to VoIP systems have been discussed and classified in various studies
(Kuhn, Walsh & Fries 2005; Frost 2006; Porter 2006, pp. 3-25; Stanton 2006; Butcher, Xiangyang
& Jinhua 2007; Dantu et al. 2009; Patrick 2009, pp. 19-44). However, the VOIPSA’s ‘VoIP
Security and Privacy Threat Taxonomy’ document provides the most comprehensive
classification of security and privacy threats which VoIP’s systems may face. These threats are
categorized as:
ï‚·
ï‚·
ï‚·
ï‚·
ï‚·
ï‚·
ï‚·
ï‚·
Misrepresentation
Theft of Services
Unwanted Contact
Eavesdropping
Interception and Modification
Service Abuse
Intentional Interruption of Service
Other Interruptions of Service.
Each threat is further sub-classified. The VOIPSA threat taxonomy is summarized in Table 2-3,
Table 2-4, Table 2-5 and Table 2-6.
VOIPSA’s VoIP Security and Privacy Threat Taxonomy
Threat class
Threat sub-classes
Misrepresentation of Identity
Misrepresentation of Authority
Misrepresentation
Misrepresentation of Rights
Misrepresentation of Content
Examples
false caller ID name or number
false voice, name, or organization in a voice/video mail
false email
false presence information
presentation of a password, key or certificate of another
circumvention of conditional access
false claim of government authority bypassing ordinary authentication
presentation of a password, key or certificate to gain rights not
granted
circumvention of conditional access to gain rights not granted
modification of access control lists
false impersonation of the voice of a caller
false impersonation of the words of a caller
misleading printed words, still images or moving images in video
modifications of spoken, written or visual content
Table 2-3 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – Misrepresentation threat
37
Chapter 2- Literature Review |
VOIPSA’s VoIP Security and Privacy Threat Taxonomy
Threat class
Threat sub-classes
Unauthorized deletion or altering of billing records
Unauthorized bypass of lawful billing systems
Theft of Services
Unauthorized billing
Taking of service provider property
Harassment
Extortion
Unwanted Contact
Unwanted Lawful Content
Call Pattern Tracking
Traffic Capture
Number Harvesting
Conversation Reconstruction
Eavesdropping
Voicemail Reconstruction
Fax Reconstruction
Video Reconstruction
Text Reconstruction
Call Black Holing
Call Rerouting
Fax Alteration
Conversation Alteration
Interception and Modification
Conversation Degrading
Conversation Impersonation and Hijacking
False Caller Identification
Call Conference Abuse
Premium Rate Service (PRS) Fraud
Service Abuse
Improper Bypass or Adjustment to Billing
Other Improper Access To Services
Table 2- 4 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – various threats
The Interruption of Service threat is categorized as Denial of Service and Physical Intrusion. The
Denial of Service is sub-classified into 4 categories: VoIP Specific Denial of Service, Network
Services DoS, Underlying Operating System/Firmware DoS and Distributed Denial of Service.
The VoIP Specific Denial of Service is further sub-classified as shown in Table 2-5.
38
Chapter 2- Literature Review |
VOIPSA’s VoIP Security and Privacy Threat Taxonomy
Threat class
Threat sub-classes
Threat sub-classes
Threat sub-classes
Request Flooding
Interruption
of Service
VoIP Specific Denial of
Service
Denial of Service
Malformed Requests and
Messages
Examples
User Call Flooding
User Call Flooding
Overflowing to Other Devices
Endpoint Request Flooding
Endpoint Request Flooding
after Call Setup
Call Controller Flooding
Request Looping
Directory Service Flooding
Disabling Endpoints with
Invalid Requests
Injecting Invalid Media into
Call Processor
Malformed Protocol
Messages
QoS Abuse
Spoofed Messages
Call Hijacking
Faked Call Teardown Message
Faked Response
Registration Hijacking
Media Session Hijacking
Server Masquerading
Network Services DoS
Underlying Operating System/Firmware DoS
Distributed Denial of Service
Physical Intrusion
Table 2-5 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – Interruption of Service threat
Physical intrusion threat includes unauthorized physical access to systems/equipment,
cables/wires and networking equipment. Social engineering attacks may occur because of
physical intrusion vulnerability.
VOIPSA’s VoIP Security and Privacy Threat Taxonomy
Threat class
Threat sub-classes
Loss of Power
Resource Exhaustion
Performance Latency
Table 2- 6 VOIPSA’s VoIP Security and Privacy Threat Taxonomy – Other Interruption of Service Threat
Other Interruptions of Service
39
Chapter 2- Literature Review |
Chapter 3- Methodology
This chapter describes the methodology of this thesis and it is organized as follows:
Section 3.1
provides an overview of this chapter
Section 3.2
introduces the research approach and discusses the concept of research
epistemologies, qualitative and quantitative research and research
reasoning process.
Section 3.3
describes the sampling method used in this research
Section 3.4
describes the approach of data analysis in this research
Section 3.5
describes the research ethics
Section 3.6
describes the on-line questionnaire design
Section 3.7
summarizes this chapter and introduces Chapter 4
40
Chapter 3- Methodology |
3-1 Overview
This chapter aims to establish the research methodology used in this thesis in order to answer
the research question.
This study seeks to evaluate the users’ awareness of VoIP security vulnerabilities, and their
attitude towards privacy and security in VoIP communications. An on-line questionnaire was
designed to collect information in order to investigate these matters. The overall research
process is summarized in Figure 3-1.
Literature study
Finding a gap in the
literature
Employing suitable
research methodology
Designing a
questionnaire
Collecting data
Analyzing data
Result interpretation
Disseminating
research outcome
Figure 3-1 Overall research process
41
Chapter 3- Methodology |
3-2 Approach
This thesis is a positivist quantitative research which intends to evaluate users’ perspectives on
VoIP’s security vulnerabilities. The research reasoning process is inductive and is depicted in
Figure 3-3. For quantitative data collection purpose, an anonymous on-line questionnaire was
designed.
3-2-1 Research epistemologies
Chua (1986) classifies research epistemologies into positivist, interpretive and critical. These
three categories are the philosophical perspective of the underlying research epistemology.
Epistemology refers to the perspectives on knowledge and the ways in which it can be obtained
(Hirschheim 1985; Myers 1997b). Hirschheim (1985) describes epistemology in detail by first
defining what knowledge is and then, addressing how valid knowledge can be acquired. The
essence of research epistemologies is to define different approaches for obtaining knowledge
which is valid. Validity is the most important feature of the obtained knowledge.
It should be noted that research epistemologies do not always contain ‘hard and fast’
differences; their differences can be blurred. It is a matter of debate whether these research
epistemologies can be accommodated within a single research strategy.
Kaplan and Duchon (1988) believe that there is no need to clearly distinguish between positivist
and interpretive studies. Instead, there is a middle road and ‘no one approach to information
systems research can provide the richness that information systems, as a discipline, needs for
further advancement’.
This thesis is a positivist study which is explained in Section 3-2-1-1 along with justifications for
employing this research epistemology. In Sections 3-2-1-2 and 3-2-1-3 interpretive and critical
studies are respectively discussed.
42
Chapter 3- Methodology |
3-2-1-1 Positivist studies
The positivist approach has been defined by many scholars over the recent past decades.
Hirschheim (1985), for example, provides a historical perspective on positivist science. He
begins his account from the 17th century to the present day and his description of positivism as
consists of the following five stages:
1. Arrival of positivism
2. Anti-positivism
3. Re-entering of positivism (logical positivism)
4. Contemporary critics
5. Post-positivism.
Orlikowski and Baroudi (1991, p. 5) define positivist studies as:
Positivist studies are premised on the existence of a priori fixed relationships within phenomena which
are typically investigated with structured instrumentation. Such studies serve primarily to test theory, in
an attempt to increase predictive understanding of phenomena.
Shanks (2002) believes that the positivist paradigm is comprised of theories, propositions,
hypotheses and hypothesis testing. In his study, he discusses these issues in detail and provides
guidelines for conducting positivist case study research.
Varey et al. (2002, p. 232) describe the main characteristics of positivist researches as ‘… formal
propositions, quantifiable measures of variables, hypothesis testing and the drawing of
inferences about a phenomenon from a sample to defined population…’
Similarly, Myers (1997b) states that:
Positivists generally assume that reality is objectively given and can be described by measurable
properties which are independent of the observer (researcher) and his or her instruments. Positivist
studies generally attempt to test theory, in an attempt to increase the predictive understanding of
phenomena.
43
Chapter 3- Methodology |
Objectivity is an important factor in positivist studies; therefore, conclusions or theories in such
studies are based on measurable properties that are consistent with this study.
The aim of this thesis is to explore users’ perspectives on VoIP’s security vulnerabilities and also
study their awareness and attitudes towards these issues. This is done by analyzing and
interpreting the results of the designed questionnaire. This approach is by nature a positivist
study since hypotheses are tested based on quantifiable measures and the conclusions are
generalized.
3-2-1-2 Interpretation studies
Myers (1997b) defines interpretation as:
Interpretive researchers start out with the assumption that access to reality (given or socially constructed)
is only through social constructions such as language, consciousness and shared meanings.
Myers (1997b) also argues that ‘Interpretive studies generally attempt to understand
phenomena through the meanings that people assign to them…’
In a similar vein Orlikowski & Baroudi (1991, p. 5) describe interpretive studies as:
Interpretive studies assume that people create and associate their own subjective and intersubjective
meanings as they interact with the world around them. Interpretive researchers thus attempt to
understand phenomena through accessing the meanings that participants assign to them.
The main characteristics of interpretive studies are described in Bailey’s (2007, p. 53) book
where social reality is ‘…a dynamic entity, historically situated in time and space, context
specific and shaped by the researcher’s views of the world…’.
44
Chapter 3- Methodology |
In contrast to positivist studies, objectivity and generalization are not considered in interpretive
studies. Instead, a deeper understanding of the phenomena in natural settings from the
participants’ perspective is sought. Principles for conducting and evaluating interpretive studies
in information systems are discussed in Klein and Myers’ (1999) analysis.
3-2-1-3 Critical studies
Cecez-Kecmanovic (2001, p. 142) defines critical studies as ‘… a process of inquiry that seeks to
achieve emancipatory social change by going beyond the apparent to reveal hidden agendas,
concealed inequalities and tacit manipulation…’. Myers (1997b) states that ‘critical research
focuses on the oppositions, conflicts and contradictions in contemporary society, and seeks to
be emancipatory…’
In their work, Orlikowski and Baroudi (1991, p. 6) describe critical studies as aiming:
… to critique the status quo, through the exposure of what are believed to be deep-seated, structural
contradictions within social systems, and thereby to transform these alienating and restrictive social
conditions.
The term ‘critical’ is an umbrella term under which related but different approaches in the
social science fall. The ‘critical theory’ is the common denominator in these approaches and for
this reason critical research epistemology has its roots in critical theory35 (Howcroft & Trauth
2004, p. 196; Cecez-Kecmanovic 2001, p. 142).
Researchers in critical studies are seen as social critiques who challenge the ideologies, beliefs
and assumptions of the status quo. Both interpretive and critical approaches evolved as a
reaction to positivism (Cecez-Kecmanovic 2001, p. 142). While interpretive studies aim is to
understand societal influences, critical studies try to question them (Howcroft & Trauth 2004, p.
201).
35
The critical theory is discussed in Hammersley’s (1995) book, ‘The politics of social research’.
45
Chapter 3- Methodology |
3-2-2 Qualitative or quantitative research
In this section, both qualitative and quantitative methodologies are described and the
fundamental differences between them are discussed. It is argued that the quantitative
research methodology suits this thesis best.
3-2-1-1 Qualitative research
There have been many academic discussions and debates about qualitative research. Some
provide in-depth descriptions of qualitative research while others simply describe it at an
introductory level.
A detailed description of qualitative research is provided by (Strauss & Corbin 1998, pp. 11-12)
as ‘… [qualitative research] can refer to research about persons’ lives, lived experiences,
behaviors, emotions, and feelings as well as about organizational functioning, social
movements, cultural phenomena, and interactions between nations’.
They also state that qualitative research has three major components as:
First, there are the data, which can come from various sources such as interviews, observations,
documents, records, and films. Second, there are the procedures that researchers can use to interpret
and organize the data. … Written and verbal reports make up the third component. These may be
presented as articles in scientific journals, in talks (e.g., conferences), or in books.
Similarly, Denzin and Lincoln (2000, pp. 3-4) define qualitative research as:
Qualitative research is a situated activity that locates the observer in the world. It consists of a set of
interpretive material practices that make the world visible. …qualitative research involves an interpretive,
naturalistic approach to the world. This means that qualitative researchers study things in their natural
settings, attempting to make sense of or interpret phenomena in terms of the meanings people bring to
them. Qualitative research involves the studied use and collection of a variety of empirical materials - case
46
Chapter 3- Methodology |
study, personal experience, introspective, life story, interview, observational, historical, interactional, and
visual texts - that describe routine and problematic moments and meaning in individuals’ lives.
Myers (1997a, p. 241) simply expresses qualitative research as methods which help researchers
to ‘…understand and explain social phenomena’. More recently, Myers (2009) provides
examples of both qualitative methods (‘…action research, case study research and
ethnography’) and qualitative data sources (‘…observation and participant observation
(fieldwork), interviews and questionnaires, documents and texts, and the researcher's
impressions and reactions’).
Qualitative research is concerned with ‘images, feelings, impressions and qualities’ (Bouma
2000, p. 19) and provides viewpoints that takes into account culture, personality and other
nuances related to humans and society (Babbie 2001, p. 37). Findings of qualitative research
are not based on statistical procedures rather they are based on the interpretation of the
researcher.
3-2-1-2 Quantitative research
According to Johnson and Onwuegbuzie (2004), ‘…the major characteristics of traditional
quantitative research are a focus on deduction, confirmation, theory/hypothesis testing,
explanation, prediction, standardized data collection, and statistical analysis’. They also cite
that:
… quantitative purists believe that …the observer is separate from the entities that are subject to
observation …[and] social science inquiry should be objective … and real causes of social scientific
outcomes can be determined reliably and validly... [quantitative] researchers should eliminate their
biases, remain emotionally detached and uninvolved with the objects of study, and test or empirically
justify their stated hypotheses.
Myers (1997b) believes that ‘quantitative research methods were originally developed in the
natural sciences to study natural phenomena. Examples of quantitative methods now well
47
Chapter 3- Methodology |
accepted in the social sciences, include survey methods, laboratory experiments, formal
methods (e.g. econometrics) and numerical methods such as mathematical modeling’; and
Babbie (2001, p. 37) simply remarks that quantitative research is ‘… where things are
quantifiable, measurable, explained and finite’.
The emphasis in quantitative research is on objective reality which is transformed into testable
hypotheses. Data are collected through experimentations and testing, and results are based on
statistical or other numerical analyses. The major data type is numeric data which is analyzed
employing statistical techniques. Reliability and validity of quantitative researches are discussed
in Bryman (2004, pp. 70-74).
The intention of this thesis is to explore users’ perspectives on VoIP’s security vulnerabilities
and investigate their awareness and attitudes towards them. This is achieved by employing a
survey method which is a traditional approach in quantitative studies. Accordingly, a
questionnaire is designed and the findings are based on quantifiable measures which are then
analyzed and reported as numbers, charts and percentages. As a consequence of the discussion
and definitions of qualitative and quantitative research, it is concluded that quantitative
research is the most suitable method for this study.
3-2-1-3 Triangulation
Although most researchers employ either qualitative or quantitative research methods, some
tend to combine them in one study. The combination of research methods in one study is called
triangulation (Myers 1997b) or mixed methodology. Denzin (1978, p. 291) defines triangulation
as ‘the combination of methodologies in the study of the same phenomenon’. An in-depth and
detailed discussion of triangulation can be found in Jick (1979).
The notion of combining qualitative and quantitative research methods is not new and in fact it
has a long tradition (19th century France) in sociological research (Erzberger & Prein 1997).
Triangulation has been a matter of debate over the years and has been the subject of much
discussion by scholars. For instance, Lee (1991) provides an integrated framework for the
48
Chapter 3- Methodology |
interpretive and positivist approaches, and Gable (1994) discusses the benefits of integrating
case study (qualitative) and survey (quantitative) research methods. In this study, case study is
the main research method and the emphasis is on how it can be enriched by survey research.
Similarly, Ragin (1987) in his book, The Comparative Method, and Kaplan and Duchon (1988) in
their paper, provide useful discussions of triangulation.
Mingers (2001) is a scholar who believes that ‘…research results will be richer and more reliable
if different research methods, preferably from different (existing) paradigms, are routinely
combined together’. Mathison (1988) also
believes that triangulation is ‘…a strategy for
increasing the validity of evaluation and research findings’. Nevertheless, some researchers
criticize triangulation. For example, (Blaikie 1991) argues that ‘… the use of triangulation has
been plagued with a lack of awareness of the different and incommensurate ontological and
epistemological assumptions associated with various theories and methods’.
Denzin (1978, pp. 294-307) provides an in-depth discussion of triangulation by outlining four
types of triangulation: (1) data triangulation; (2) investigator triangulation; (3) theory
triangulation; and (4) methodological triangulation. Mathison (1988) argues that only 3 types of
triangulation are practical and the theory triangulation ‘…is problematic at best, and likely
impossible in reality’. He refers to Denzin’s note at the end of the chapter and writes that even
Denzin is uncertain about the plausibility of the theory triangulation.
There is no unique and best research approach. Although triangulation (mixed methodology) is
not necessarily the most suitable method, it might be an appropriate one. Triangulation has a
number of advantages. In a triangulated research design the deficiency of a method can be
overcome by using the advantages of another method. For instance, quantitative data
collection approaches can be employed to test hypotheses which are generated by qualitative
methods. Actual studies of the use of triangulation can be found in Markus (1983) and
Amaratunga and Baldry (2001). The strengths and weaknesses of triangulation are summarized
in Johnson and (Onwuegbuzie 2004, p. 21).
49
Chapter 3- Methodology |
3-2-1-4 Compare and contrast: quantitative versus qualitative research
From an epistemological perspective, qualitative and quantitative research lie respectively
within the domain of interpretivist (naturalist) and positivist (empiricist) epistemologies. Lincoln
and Guba (1985, p. 37) list the different axioms between qualitative (naturalist) and
quantitative (positivist) research (Table 3-1).
The nature of reality
The relationship of
knower to the known
The possibility of
generalization
Quantitative (positivist)
Qualitative (naturalist)
Reality is single, tangible and
fragmentable.
Realities are multiple, constructed
and holistic.
Knower and known are independent,
a dualism.
Knower and known are interactive
and inseparable.
Time and context free
generalizations (nomothetic
statements) are possible.
Only time and context bound
working hypotheses (idiographic
statements) are possible.
There are real causes,
linkages
Temporally precedent to or
simultaneous with their effects.
All entities are in a state of mutual
simultaneous shaping, so that it is
impossible to distinguish causes from
effects.
The role of values
Inquiry is value-free.
Inquiry is value-bound.
The possibility of causal
Table 3-1 The Different axioms between qualitative (naturalist) and quantitative (positivist) research
Modified from Lincoln and Guba (1985, p. 37)
Qualitative research constructs social reality (cultural meaning) with a focus on interactive
processes and events and utilizes thematic analysis while researchers are involved with the
studied phenomenon. In contrast, quantitative research measures objective facts with a focus
on variables and employs statistical analysis while researchers are detached from the studied
phenomenon (Neuman 2003, p. 16).
Qualitative research is often associated with social sciences and is the “what’s it like?” study
method which emphasizes ‘…the qualities of entities and on processes and meanings that are
50
Chapter 3- Methodology |
not experimentally examined or measured (if measured at all) in terms of quantity, amount,
intensity, or frequency… [and] …seek answers to questions that stress how social experience is
created and given meaning’ (Denzin & Lincoln 2000, p. 10). In contrast, quantitative research is
associated with the sciences which lend themselves well to quantification, such as
mathematics, physics and chemistry. Here the emphasis is on ‘…the measurement and analysis
of causal relationships between variables, not processes’ (Denzin & Lincoln 2000, p. 10).
Glesen and Peshkin (1992) compare and contrast qualitative and quantitative research. Their
summary of the differences is shown in Table 3-2.
Quantitative Research (Positivist Research)
Assumptions
Purpose
Qualitative Research (Interpretivist Research)
-Social facts have an objective reality
-Reality is socially constructed
-Primacy of method
-Primacy of subject matter
-Variables can be identified and relationships
measured
-Variables are complex, interwoven, and difficult
to measure
-Etic (outside's point of view)
-Emic (insider's point of view)
-Generalizability
-Contextualization
-Prediction Causal explanations
-Interpretation
-Understanding actors' perspectives
Approach
Researcher role
-Begins with hypotheses and theories
-Ends with hypotheses and grounded theory
-Manipulation and control
-Emergence and portrayal
-Uses formal instruments
-Researcher as instrument
-Experimentation
-Naturalistic
-Deductive
-Inductive
-Component analysis
-Searches for patterns
-Seeks consensus, the norm
-Seeks pluralism, complexity
-Reduces data to numerical indices
-Makes minor use of numerical indices
-Abstract language in write-up
-Descriptive write-up
-Detachment and impartiality
-Personal involvement and partiality
-Objective portrayal
-Empathic understanding
Table 3-2 Qualitative and quantitative research compared and contrasted (adapted from Glesen and Peshkin (1992)
51
Chapter 3- Methodology |
3-2-3 Research reasoning process
In this section deductive and inductive research reasoning processes are described along with
justifications for employing inductive reasoning in this research.
Goel and Dolan (2004) define reasoning as:
… the cognitive process of drawing inferences from given information. All arguments involve the claim
that one or more propositions (the premises) provide some grounds for accepting another proposition
(the conclusion).
The research reasoning process can be categorized as deductive and inductive reasoning.
3-2-3-1 Deductive reasoning
Goel and Dolan (2004) believe that deductive reasoning evaluates the validity of deductive
arguments. They describe the validity as ‘… a function of the relationship between premises
and conclusion and involves the claim that the premises provide absolute grounds for accepting
the conclusion’ and provide the following example as a deductive argument which can be
validated:
All men are mortal; Socrates is a man; Socrates is mortal
3-2-3-2 Inductive reasoning
In deductive reasoning validity is evaluated but in inductive reasoning arguments are never
valid. However, the plausibility or reasonableness of inductive arguments can be evaluated.
Below is an example of an inductive argument (Goel & Dolan 2004):
Socrates is a man; Socrates is mortal; all men are mortal
52
Chapter 3- Methodology |
Klauer (1996) describes inductive reasoning as ‘…the process whereby regularities or order are
detected and, inversely, whereby apparent regularities, seeming generalizations, are disproved
or falsified’. He points out that inductive reasoning can be considered as a process of detecting
commonalities by stating similarities and differences. However, he emphasizes that ‘…it is not
enough to compare whole objects globally to each other. Instead, they have to be compared
with respect to their attributes or to the relations held in common.’
3-2-3-3 Compare and contrast: deductive versus inductive reasoning
Trochim (2006) provides a simple and easy-to-understand definition of both deductive (topdown approach) and inductive (bottom-up approach) reasoning. These are depicted in Figures
3-2 and 3-3.
Theory
Observation
Hypothesis
Pattern
Observation
Tentative hypothesis
Comfirmation
Theory
Figure 3- 2 Deductive research reasoning process
Figure 3- 3 Inductive research reasoning process
As shown in Figure 3-2, the deductive reasoning process moves from the more general to the
more specific while inductive reasoning works the other way around.
Deductive reasoning begins from a theory and narrows down to a specific hypothesis which is
testable by observations. In contrast to this, inductive reasoning begins with specific
observations in order to detect patterns to be able to propose some tentative hypotheses.
Deductive reasoning processes end with the confirmation or rejection of a theory which is
53
Chapter 3- Methodology |
based on the collected data in the observation stage, while inductive reasoning processes end
with a development of a theory (Trochim 2006).
It should be noted that the inductive reasoning approach is useful for theory building while
deductive reasoning is useful for theory testing. As this study intends to develop theories
concerning users’ perspectives on VoIP’s security vulnerabilities, inductive reasoning seems to
be the appropriate choice. Furthermore, since in this research the theories were developed
based on the detected patterns which were explored by 1) designing a questionnaire 2)
collecting data 3) analyzing data and 4) result interpretation, it was concluded that inductive
reasoning is the best research method of reasoning for this study.
3-3 Sampling
In quantitative research the emphasis is on generalization and the aim is to apply the findings
(relationships amongst quantifiable measured parameters) to the general population. When
the interested population36 is small it is easy to survey the entire population. For example, For
example, if the population consists of the Heads of School at the University of South Australia,
we then have to survey only about 20 people in order to survey the complete population.
However, when the population is large (i.e. international students in Australia or Australian
aged 25-55, etc.) in most cases it is not practical or due to time and budget constraints it is not
feasible to survey each and every one of the individuals in the interested population. Therefore,
a sample representative of the population is surveyed which is much faster, cheaper and easier.
Statistical extrapolations can be made from the selected sample to the interested population.
Sampling is a statistical technique that refers to the sample selection approaches. Sampling is
discussed in detail in (Yates 1960, pp. 1-47; Sudman 1976).
36
In terms of sampling, population refers to all the individuals who fall into the category of interest (Hall 1996, p. 107).
54
Chapter 3- Methodology |
3-4-1 General universe, population and sample
In the context of sampling there are 3 overlapping different types of group of individuals:
(1) general universe; (2) population (working universe); and (3) sample (Rose 1982, pp. 56-59).
This concept is depicted in Figure 3-4.
General universe
Population
Sample
Figure 3- 4 Sampling overlapping entities
Table 3-3 defines these entities (group of individuals) in the context of this study.
Entities
Definition
General universe
All the people who use VoIP as a mean of communication
Population
(working universe)
Students enrolled in the School of Computer and Information Science at the,
University of South Australia
Sample
The respondents to the questionnaire
Table 3- 3 Definition of group of individuals in this thesis
55
Chapter 3- Methodology |
3-4-2 Sampling types
Different sampling techniques have been discussed in numerous studies (Nardi 2006, pp. 107126; Hall 1996, pp. 106-116; De Vaus 1995, pp. 60-79; Henry 1990, pp. 17-32; Weisberg 1977,
pp. 17-26; Warwick 1975, pp. 69-77). The provided classification of sampling in these studies
slightly varies. There is, however, a consensus that sampling is broadly categorized as
probability sampling (or ‘unbiased sampling’ or ‘random sampling’) and non-probability
sampling (or ‘biased sampling’ or ‘nonrandom sampling’).
According to Henry (1990, p. 17):
Probability samples are selected in such a way that every member of the population actually has a
possibility [nonzero probability with the same chance] of being included in the sample. Nonprobability
samples are selected based on the judgment of the researchers [not by chance or known probabilities of
selection] to achieve particular objectives of the research at hand.
Figure 3-5 depics Nardi’s (2006, pp. 107-126) classifications of sampling.
56
Chapter 3- Methodology |
Simple Random
Sampling
Probability
Sampling
Stratified
Random
Sampling
Systematic
Random
Sampling
Cluster or
Multistage
Sampling
Sampling
Convenience or
accidental
Sampling
Non-Probability
Sampling
Purposive or
Judgmental
Sampling
Quota Sampling
Snowball
Sampling
Figure 3- 5 Classification of sampling
3-4-3 The used sampling type
In evaluating users’ awareness of VoIP security vulnerabilities, and their attitudes towards
privacy and security in VoIP communications, this thesis uses an on-line questionnaire that was
designed to collect information in order to investigate these matters. The goal was to survey
the entire population; therefore, the ‘Recruitment email’ (refer to Appendix B) was sent to all
students enrolled at the School of Computer and Information Science (CIS), University of South
Australia.
57
Chapter 3- Methodology |
Surveying the entire population implies that each and every student has to be surveyed and
obviously this was not the case in this research. There were 300 students in CIS but only 107
responded to the on-line questionnaire and this means that only 35.6% of the population
participated – just over a third of the student cohort.
Purposive sampling was employed in this study. In order to describe how this sampling method
was improved, Simple Random Sampling (SRM) is defined and then purposive sampling is
addressed.
3-4-3-1 Simple Random Sampling
Simple Random Sampling (SRS) falls under the probability sampling category which implies each
student had an equal chance (probability) of being selected. As mentioned earlier, an email
which advertized the on-line questionnaire (the recruitment email, refer to Appendix B) was
sent to all the students of CIS; consequently, each student had nonzero probability with the
same chance of being selected.
According to Sudman (1976, pp. 49-50), SRS has two main characteristics: ‘…(1) the
probabilities of selection are equal for all elements, and (2) sampling is done in one stage with
elements of the sample selected independently of one another …’. The sampling method used
in this research was done in one stage and students were selected independently of each other;
therefore, both features of SRM were addressed.
Henry (1990, p. 27) in regard to SRS states that:
All members of the study population are either physically present or listed, and the members are selected
at random until a previously specified number of members or units has been selected. … [it is assumed
58
Chapter 3- Methodology |
that the selection is] without replacement37. This means that once a unit is selected in the sampling
process, it is removed from the pool eligible for future selection.
In a true SRS each unit or member of the population should be clearly and unambiguously
identified (Warwick 1975, p. 77) and listed. The complete list of all possible elements in the
population that are uniquely recognizable is called a sample frame. From the sample frame the
samples are chosen by applying a random selection process. For example, a common random
selection process 38 is using a table of random numbers.
It should be pointed out that the above-mentioned procedure could not be used in this
research. This is due to the fact that the complete list of CIS students was not available to the
author.
3-4-3-2 Purposive sampling
According to Guarte and Barrios (2006) ‘Purposive sampling is described as a random selection
of sampling units within the segment of the population with the most information on the
characteristic of interest’. However, in other studies purposive sampling is part of the nonprobability sampling category (Warwick 1975; Weisberg 1977), which is considered to be an
example of biased sampling and non-random sampling.
The studied population (working universe) in this research consists of the students in the School
of Computer and Information Science (CIS) at the University of South Australia. The reason for
37
In simple random sampling there is a theoretical issue on whether once an unit is selected it should be removed from the
pool or it should be remained for possible reselection in the sampling process. These approches are called sampling without
replacement and sampling with replacement, respectively. In practice sampling without replacement is more prevalent.
38
In a random selection process or a random technique the goal is to apply the random (chance) process to the rage of
numbers corresponding to the list (Warwick 1975, p. 77). In this way samples are chosen randomly. In Sudman (1976, p. 50)
there is a detailed discussion on the randomness of chance (random) selection processes. And in (Nardi 2006, p. 114) and (De
Vaus 1995, pp. 61-64) there are examples of how to use a table of random numbers.
59
Chapter 3- Methodology |
this selection is that it is assumed that the students at CIS are generally familiar with VoIP and
network security concepts.
To avoid introducing bias into the sample selection and increasing the validity of the sampling,
we ensured that the two main characteristics of SRS namely, independence between selected
elements and sampling at once, were included in the sampling process. As mentioned earlier,
an email advertising the on-line questionnaire (the recruitment email, see Appendix B) was sent
to all the students of CIS; consequently, each student had nonzero probability with the same
chance of being selected.
3-4 Data Analysis (Quantitative Data)
3-4-1 Coding
Preliminary step in quantitative data analysis is coding. In addition to coding, classifying the
responses enables the data to be better analyzed. The responses to the on-line questionnaire
are classified by sequential number orders and then coded. As illustrated in Table 3-4, each
respondent has only one code for each variable. The open questions are listed separately and
grouped into small categories. For coding and analyzing the collected data, SPSS39 (PASW
Statistics 17.0 (release 17.0.2)) and Microsoft Excel 2007 were used.
39
PASW (Predictive Analytics SoftWare) Statistics was the premier vendor for SPSS (Statistical Package for the Social Sciences).
After IBM acquired the company, the PASW software became IBM SPSS Statistics. SPSS (http://www.spss.com) is a software
that is used to analyze data collected from observations, surveys, etc. This program provides a range of statistical analyses
along with graphical presentation of data and currently it is offered in 4 versions, 1-Standard (Fundamental analytical
capabilities), 2- Professional (Additional capabilities), 3- Premium (A full range of analytical techniques) and 4- IBM SPSS
Statistics for Educators (Faculty Packs and Campus Edition software).
60
Chapter 3- Methodology |
Number
Variable Name
Type of variable
Nationality
Average monthly talking time
Average monthly international call time via
phone/mobile
Using computer to make calls/voice chat
Average monthly use of computer to make
calls/voice chat
Preferred way to make international calls
Preferred service for international calls via land
line/mobile
Main reason for choosing this service
nominal (categorical)
nominal (categorical)
Preferred software for making calls/voice chat
Main reason for choosing this software
Concerned features when making international
calls
Comparison of security between
international/long distance calls and domestic
calls
nominal (categorical)
nominal (categorical)
Background
1
2
3
4
5
6
7
8
nominal (categorical)
nominal (categorical)
nominal (categorical)
nominal (categorical)
nominal (categorical)
nominal (categorical)
Awareness/attitude
towards VoIP
security/privacy
1
2
3
4
5
6
7
8
9
10
11
12
Privacy concerns when making calls (regardless
of the used service)
Traditional telephony security versus VoIP
security
Concern about VoIP privacy (eavesdropping)
Possibility of privacy breaches in VoIP versus
traditional telephony
Concern about VoIP security
Possibility of privacy/security breaches in VoIP
Discussing security/privacy issues with service
providers
The discussed security/privacy issues with
service providers
nominal (categorical)
nominal (categorical)
ordinal
nominal (categorical)
nominal (categorical)
nominal (categorical)
ordinal
Open-ended
ordinal
Open-ended
Table 3- 4 Data Analysis
3-4-2 Relationship between variables
According to the SPSS tutorial, the purpose of a cross-tabulation is to show the relationship (or
otherwise) between two variables. Cross-tabulation tables or contingency tables demonstrate
61
Chapter 3- Methodology |
the relationship between nominal40 or ordinal41 variables. The size of the table is determined by
the number of distinct values for each variable, with each cell in the table representing a unique
combination of values. A number of statistical tests are available to determine if the
relationship between variables is statistically significant. In this study, chi-square test - which is
more common and appropriate for almost any kind of data - is used. In a chi-square test the
“Asymp. Sig” value (significance value) indicates whether the two variables are related
(dependent). The lower the value, the more likely it is that the two variables are related. In this
study, we selected a significance level of 0.05, and consequently an “Asymp. Sig” value less than
0.05 implies that the two variables are related.
3-5 Research Ethics
Because human subjects were involved, ethics approval was obtained from the Human
Research Ethics Committee of the University of South Australia prior to the start of this
research. Furthermore, since the participants came from the university’s School of Computer
and Information Science, written approval to recruit participants was obtained from the Head
of the school.
The participant information sheet (refer to Appendix A) explaining the purpose and scope of
the study was distributed to potential participants. It informed them of their level of
commitment and also gave them confidence to participate in this research.
40
As illustrated in Table 3-4 the questionnaire contains 16 questions that use nominal (categorical) scales. These questions
produce categorical (nominal) data that have no numerical value and fit into categories such as country. Four (4 out of 16) of
the categorical questions (questions 3, 5, 14 and 18 refer to Appendix C) are dichotomous (data take on one of two values such
as yes or no).
41
As illustrated in Table 3-4 the questionnaire contains 2 questions (questions 12 and 16 refer to Appendix C) that use ordinal
scales. These questions produce ordinal data that shows order exists among the categories. This indicates that one observation
is more important or of greater values than others. These questions are also referred as scales questions.
62
Chapter 3- Methodology |
Since submitting the completed on-line questionnaire is an act of consent, seeking consent
from participants was not necessary. The questionnaire was anonymous and did not contain
any personal questions. Therefore, participants' identity remained confidential. Furthermore, in
the participant information sheet, it was stated that completing the questionnaire is optional.
3-6 Questionnaire design
The on-line questionnaire is anonymous and Google Docs was used to design it. The answers to
the questions are stored at Google’s server in Google Docs spreadsheet format and it is
accessible by logging into the corresponding Gmail account.
The questionnaire contains closed and open questions. Closed questions are asked when the
potential answers are known or a scale is used. Otherwise, open questions are asked.
In designing the questionnaire, the following points were considered:

Use simple words

Avoid vague language

Provide easy-to-understand instructions

Design an appealing and easy-to-follow layout

Use short and easy-to-understand questions

Avoid hypothetical questions

Use leading and unambiguous questions

Avoid asking two questions within a single question

Provide enough room to answer questions
63
Chapter 3- Methodology |
3-7 Summary
For this thesis quantitative research methodology was employed and in order to evaluate users’
perspective on VoIP’s security vulnerabilities, an anonymous on-line questionnaire, using
Google Docs, was designed. Chapter 4 describes the results and findings.
64
Chapter 3- Methodology |
Chapter 4- Results
This chapter presents the results of this study. It is organized as follows:
Section 4.1
provides an overview of this chapter
Section 4.2
describes the overview and analysis of the questions concerning the online questionnaire.
Section 4.3
65
summarizes this chapter and introduces Chapter 5
Chapter 4- Results |
4-1 Overview
This chapter summarizes the results and findings regarding the on-line questionnaire (refer to
Appendix C and Chapter 3). The on-line questionnaire was designed to collect information in
order to evaluate the users’ awareness of VoIP security vulnerabilities, and their attitudes
towards privacy and security in VoIP communications. The ‘Recruitment email’ (refer to
Appendix B) was sent to all students at the University of South Australia’s School of Computer
and Information Science (CIS), to encourage them to answer the questionnaire. Out of 30042
recruitment email sent, 107 valid responses were received. To analyze the collected data, SPSS
(PASW Statistics 17.0 (release 17.0.2)) and Microsoft Excel 2007 were used.
4-2 The survey results
The results of the on-line questionnaire are presented in this section, while the discussions of
the investigated issues are provided in the next chapter. The results are categorized into two
main categories: firstly, background; and secondly, awareness of/attitude to VoIP
security/privacy. In the first category, general information such as nationality, average monthly
talking time and etc… are investigated. The second category intends to explore the participants’
awareness and attitudes towards VoIP security and privacy. Furthermore, the relationships
between the two categories are examined in order to investigate whether any relationship
exists between users’ call habits and awareness/ attitude towards VoIP security and privacy.
It should be emphasized that in this study privacy is considered as eavesdropping while VoIP
security is considered to be other violating actions such as toll fraud. However, the occurrence
of privacy breaches indicates that the system is not well secure. In that sense, privacy breaches
in the VoIP system are synonymous to security vulnerabilities.
42
This is the approximate (not precise) number of students who received the recruitment email.
66
Chapter 4- Results |
4-2-1 Background
4-2-1-1 Nationality
As depicted in Figures 4-1 and 4-2, the majority (60%) of participants in this study (64 out of
107) are Australian, while 40% are from 18 different countries (43 out of 107).
Results by Country
Others
Others
40%
Australia
Australia
60%
Figure 4-1 Overall results by country
In second place was Iran with 10 respondents and this country was followed by Afghanistan (8),
China (5) and India (4). Either 1 or 2 respondents come from other countries. Figure 4-2
illustrates the number of participants according to country.
Number of Participants by country
64
10
1
1
1
2
1
1
2
1
1
1
2
South Korea
Malaysia
Maldives
Russia
South Africa
Taiwan
Trinidad and Tobago
United Kingdom
Vietnam
4
Iran
China
Canada
Australia
Afghanistan
1
Japan
5
Italy
1
India
8
Fiji
70
60
50
40
30
20
10
0
Figure 4-2 Number of Participants by Country
The participants’ nationality was asked in order to investigate whether there is any relationship
between nationality and awareness and attitude towards security/privacy issues in VoIP. No
relationship was found.
67
Chapter 4- Results |
4-2-2-2 Average monthly talking time
As shown in Table 4-1, more respondents either spend more than 7 hours (37.4%) or 1 to 4
hours (34.6%) per month talking on the phone/mobile.
Average monthly talking time
Frequency
Percent
1 hour – 4 hours
37
34.6
4 hours – 7 hours
15
14.0
Less than 1 hour
15
14.0
More than 7 hours
40
37.4
Total
107
100.0
Table 4-1 Average monthly talking time
The time spent talking was asked in order to investigate whether any relationship exists
between talking time and awareness and attitude towards security/privacy issues in VoIP. The
relationship between the average monthly talking time and participants’ concern about VoIP
security and privacy (eavesdropping) was found to be significant. This is illustrated in Tables 4-2
and 4-3.
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .005
Concern about VoIP privacy (eavesdropping)
Average monthly talking time: 1 hour – 4 hours
Count
%
4 hours – 7 hours
Count
%
Less than 1 hour
Count
%
More than 7 hours Count
%
Total
Count
%
No
Yes
Total
25
10
35
71.4%
28.6%
100.0%
9
6
15
60.0%
40.0%
100.0%
10
4
14
71.4%
28.6%
100.0%
13
26
39
33.3%
66.7%
100.0%
57
46
103
55.3%
44.7%
100.0%
Table 4-2 Relationship between talking time and being concern about VoIP privacy (eavesdropping)
68
Chapter 4- Results |
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .036
Concern about VoIP Security
(1=Not concerned, 5=Very concerned)
Average monthly talking time: 1 hour – 4 hours
Count
%
4 hours – 7 hours
Count
%
Less than 1 hour
Count
%
More than 7 hours
Count
%
Total
Count
%
1
2
3
4
5
Total
13
4
9
6
1
33
39.4%
12.1%
27.3%
18.2%
3.0%
100.0%
2
5
0
4
2
13
15.4%
38.5%
.0%
30.8%
15.4%
100.0%
4
3
2
5
1
15
26.7%
20.0%
13.3%
33.3%
6.7%
100.0%
6
2
12
11
6
37
16.2%
5.4%
32.4%
29.7%
16.2%
100.0%
25
14
23
26
10
98
25.5%
14.3%
23.5%
26.5%
10.2%
100.0%
Table 4-3 Relationship between talking time and being concern about VoIP security
Table 4-2 indicates that those who spend more time on the phone/mobile are more concerned
about privacy (eavesdropping) when using VoIP. 56.5% (26 out of 46) of the respondents who
use phone/mobile more than 7 hours per month are concerned about VoIP privacy, while only
8.7% (4 out of 46) of the respondents who use phone/mobile less than 1 hour per month have
the same concern.
Table 4-3 indicates that the majority of respondents who use phone/mobile more than 7 hours
per month are more concerned about VoIP security. Only 21.6% (8 out of 37) of the
respondents who use phone/mobile more than 7 hours per month selected either Scale 1 or 2
(not or little concerned), while 45.9% (17 out of 37) selected either Scale 4 or 5 (very
concerned).
4-2-3-3 Average monthly international call time via phone/mobile
As shown in Table 4-4, more respondents (34.6%) do not use phone/mobile for making
international calls. However, 29% spend less than 1 hour and 22.4% spend 1 to 3 hours each
69
Chapter 4- Results |
month on making international calls using phone/mobile. Only 14% dedicate more than 3 hours
of their phone/mobile conversation time to international calls.
Average monthly international call time
Frequency
Percent
1 hour – 3 hours
24
22.4
Less than 1 hour
More than 3 hours
N/A
Total
31
15
37
107
29.0
14.0
34.6
100.0
Table 4- 4 Average monthly international call time
The average monthly international call time (via phone/mobile) was asked in order to
investigate whether any relationship exists between international talking time and awareness
and attitude towards security/privacy issues in VoIP.
It turns out that the relationship between average monthly international talking time (via
phone/mobile) and participants’ concerns about privacy (regardless of the used service),
particularly about VoIP privacy and VoIP security, was found to be significant. This is illustrated
in Tables 4-5, 4-6 and 4-7.
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .001
Privacy concerns when making calls
(1=Not concerned, 5=Very concerned)
Average monthly
international call time:
1 hour – 3 hours
Count
%
Less than 1 hour
Count
%
More than 3 hours
Count
%
N/A
Count
%
Total
Count
%
1
2
3
4
5
Total
3
3
8
6
3
23
13.0%
13.0%
34.8%
26.1%
13.0%
100.0%
6
8
5
10
1
30
20.0%
26.7%
16.7%
33.3%
3.3%
100.0%
1
1
0
8
5
15
6.7%
6.7%
.0%
53.3%
33.3%
100.0%
11
14
3
6
2
36
30.6%
38.9%
8.3%
16.7%
5.6%
100.0%
21
26
16
30
11
104
20.2%
25.0%
15.4%
28.8%
10.6%
100.0%
Table 4-5 Relationship between international talking time and being concern about privacy when making calls
70
Chapter 4- Results |
Table 4-5 indicates that the majority of respondents who make international calls by
phone/mobile are concerned about privacy (eavesdropping). 80.4% (33 out of 41) of the
respondents who are very concerned about privacy (selected either 5 or 4 on the scale of 1 to
5) use phone/mobile to make international calls. The same trend applies to those who selected
3 on the 1 to 5 scale.
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .002
Concern about VoIP privacy (eavesdropping)
Average monthly
1 hour – 3 hours
Count
%
international call time:
Less than 1 hour
Count
%
More than 3 hours
Count
%
N/A
Count
%
Total
Count
%
No
Yes
Total
8
16
24
33.3%
66.7%
100.0%
17
12
29
58.6%
41.4%
100.0%
5
10
15
33.3%
66.7%
100.0%
27
8
35
77.1%
22.9%
100.0%
57
46
103
55.3%
44.7%
100.0%
Table 4-6 Relationship between international talking time and being concern about VoIP privacy (eavesdropping)
Table 4-6 indicates that most respondents who use VoIP to make international calls by their
phone/mobile are concerned about privacy (eavesdropping). The table shows that 82.6% (38
out of 46) of the respondents who use VoIP to make international calls on their phone/mobile
are concerned about privacy (eavesdropping), and in contrast, 52.6% (30 out of 57) are not.
Table 4-7 indicates that the majority of respondents who use phone/mobile more than 1
hour/month for making international calls are more concerned about VoIP security. Only 18.4%
(7 out of 38) who use phone/mobile more than 1 hour/month for making international calls
selected either Scale 1 or 2 (not or little concerned), while 47.3% (18 out of 38) selected either
Scale 4 or 5 (very concerned) and 34.2% (13 out of 38) selected Scale 3.
71
Chapter 4- Results |
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .006
Concern about VoIP security
(1=Not concerned, 5=Very concerned)
Average monthly
1 hour – 3 hours
Count
%
international call time:
Less than 1 hour
Count
%
More than 3 hours
Count
%
N/A
Count
%
Total
Count
%
1
2
3
4
5
Total
4
1
9
4
5
23
17.4%
4.3%
11
2
39.3%
7.1%
1
1
6.7%
6.7%
9
10
39.1% 17.4% 21.7%
6
8
21.4% 28.6%
4
6
8
28.1% 31.3% 12.5% 25.0%
25
14
1
28
3.6%
100.0%
3
15
26.7% 40.0% 20.0%
4
23
26
100.0%
100.0%
1
32
3.1%
100.0%
10
98
25.5% 14.3% 23.5% 26.5% 10.2%
100.0%
Table 4-7 Relationship between international talking time and being concern about VoIP security
4-2-4-4 Using computers to make calls/voice chat
As shown in Table 4-8 most respondents (68.2%, 73 out of 107) use computers to make
calls/voice chat.
Using computer to make calls/voice chat
Frequency
Percent
No
34
31.8
Yes
Total
73
107
68.2
100.0
Table 4- 8 Usage of computers to make calls/voice chat
The question concerning usage of computers to make calls/voice chat was asked in order to
investigate whether any relationship exists between talking time and awareness and attitude
towards security/privacy issues in VoIP. The relationship between using computers to make
calls/voice chat and the possibility of privacy breaches emerged as being significant. This is
illustrated in Table 4-9.
72
Chapter 4- Results |
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .041
Using computer to make calls/voice chat
Possibility of privacy breaches in traditional telephony versus VoIP
Don’t know
Count
%
(Possibility of privacy breaches in traditional
No
telephony is not more than possibility of privacy
breaches in VoIP)
Same
Count
%
Count
%
(Possibility of privacy breaches in traditional
telephony is more than possibility of privacy
breaches in VoIP)
Yes
Total
Count
%
Count
%
No
Yes
Total
17
18
35
48.6%
51.4%
100.0%
6
21
27
22.2%
77.8%
100.0%
5
10
15
33.3%
66.7%
100.0%
5
23
28
17.9%
82.1%
100.0%
33
72
105
31.4%
68.6%
100.0%
Table 4-9 Relationship between using computer to make calls/voice chat and possibility of privacy breaches
Table 4-9 indicates that approximately the same number of participants, regardless of the use
of computers to make calls/voice chat, think either traditional telephony is more secure than
VoIP or vice versa. 18.1% (6 out of 33) of the respondents who do not use computers to make
calls/voice chat believe that privacy breaches are more likely to occur in VoIP while 15.1% (5
out of 33) think the opposite. 29.1% (21 out of 72) of the respondents who use computers to
make calls/voice chat believe that breaches of privacy are more possible in VoIP while 31.9%
(23 out of 72) think the opposite is the case.
4-2-5-5 Average monthly use of computers to make calls/voice chat
Table 4-10 shows that 27.1% of the respondents (29 out of 107) do not use computers to make
calls/voice chat while 72.9% (78 out of 107) do so. 25.2% (27 out of 107) spend 1 hour–3 hours,
24.3% (25 out of 107) spend less than 1 hour and 24.3% (26 out of 107) spend more than 3
hours per month on computers making calls/voice chat
73
Chapter 4- Results |
Average monthly use of computer to make calls/voice chat
Frequency
Percent
1 hour – 3 hours
27
25.2
Less than 1 hour
More than 3 hours
N/A
Total
25
26
29
107
23.4
24.3
27.1
100.0
Table 4-10 Average monthly use of computer to make calls/voice chat
It has to be pointed out that no relationship was found between average monthly use of
computer to make calls/voice chat and awareness and attitude towards security/privacy issues
in VoIP.
4-2-6-6 Preferred way to make international calls
Table 4-11 indicates that 50.5% of the respondents (54 out of 107) prefer to use computers to
make international calls while 46.7% (50 out of 107) prefer to use landline/mobile.
Preferred way to make international calls
Frequency
Percent
Computer
54
50.5
Land line/mobile
50
46.7
Total
Missing
Total
104
97.2
3
2.8
107
100.0
Table 4-11 Preferred way to make international calls
This question was asked in order to investigate whether the participants prefer to use
computers or landline/mobile to make international calls and whether this preference is related
to VoIP privacy/security issues.
The relationship between the preferred methods to make international calls (via computer or
landline/mobile) and participants’ opinions about whether traditional telephony is more secure
than VoIP, and also participants’ concern about VoIP privacy and VoIP security, was found to be
significant. This is illustrated in Tables 4-12, 4-13 and 4-14.
74
Chapter 4- Results |
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .022
Preferred way to make international calls
Traditional telephony security versus VoIP security
Don’t know
Computer
Land line/mobile
Total
12
9
21
57.1%
42.9%
100.0%
Count
%
(Traditional telephony is not more
secure than VoIP)
No
Count
%
Same
Count
%
(Traditional telephony is more secure
than VoIP)
Yes
Count
%
Total
Count
%
20
8
29
69.0%
27.6%
100.0%
6
6
12
50.0%
50.0%
100.0%
14
27
43
32.6%
62.8%
100.0%
54
50
107
50.5%
46.7%
100.0%
Table 4-12 Relationship between the preferred way to make international calls and participants’ opinion about whether
traditional telephony is more secure than VoIP
Table 4-12 indicates that the majority of participants who prefer to use computers for
international calls do not think that traditional telephony (landline/mobile) is more secure than
VoIP. In contrast most participants who prefer traditional telephony (landline/mobile) over
computer for making international calls think the opposite. 37% (20 out of 54) of the
respondents preferring computers over landline/mobile for international calls believe that
traditional telephony is not more secure than VoIP, and 54% (27 out of 50) of the respondents
choosing landline/mobile think that traditional telephony is more secure than VoIP.
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .003
Concern about VoIP privacy (eavesdropping)
Preferred way to make
Computer
Count
%
international calls
Land line/mobile
Count
%
Total
Count
%
No
Yes
Total
36
16
52
69.2%
30.8%
100.0%
19
29
48
39.6%
60.4%
100.0%
55
45
100
55.0%
45.0%
100.0%
Table 4-13 Relationship between the preferred way to make international calls and participants’ concern about VoIP privacy
75
Chapter 4- Results |
Table 4-13 indicates that the participants who prefer to use computers for international calls
are less concerned about VoIP privacy issues and in contrast, those who prefer landline/mobile
are more concerned. This seems to be contradictory due to the fact that when we use
computers for international calls we are actually using VoIP, while in the case of
landline/mobile, VoIP might be used. 65.4% (36 out of 55) of the respondents who prefer
computers over landline/mobile for international calls are not concerned about privacy
(eavesdropping) in VoIP. It emerged that 64.4% (29 out of 45) who prefer landline/mobile are
concerned.
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .001
Concern about VoIP security
(1=Not concerned, 5=Very concerned)
Preferred way to make
Computer
Count
%
international calls
Land line/mobile
Count
%
Count
Total
%
1
2
3
4
5
Total
21
7
11
11
1
51
41.2%
13.7%
21.6%
21.6%
2.0%
100.0%
4
7
12
14
9
46
8.7%
15.2%
26.1%
30.4%
19.6%
100.0%
25
14
23
25
10
97
25.8%
14.4%
23.7%
25.8%
10.3%
100.0%
Table 4-14 Relationship between the preferred way to make international calls and participants’ concern about VoIP security
The relationship between the preferred way to make international calls and participants’
concerns about VoIP privacy and VoIP security are consistent. Both relationships indicate that
the respondents who prefer computers over landline/mobile for international calls are less
concerned about VoIP privacy and vice versa. Table 4-14 indicates that the majority of the
participants who like to use computers for international calls selected either Scale 1 or 2 (not or
little concerned). Conversely, the majority of the participants who prefer to use line/mobile for
international calls selected either Scale 4 or 5 (very concerned).
54.9% (28 out of 51) of the respondents who prefer computers selected either Scale 1 or 2 from
a five-point scale (not or little concerned about privacy when making international calls using
VoIP ). However, 21.5% (11 out of 51) selected Scale 3, and 50% (23 out of 46) who prefer land
76
Chapter 4- Results |
line/mobile selected either Scale 4 or 5 from a five-point scale (very concerned about privacy
when making international calls using VoIP). Furthermore, 26% (12 out of 46) selected Scale 3
which also indicates their concern about privacy when using VoIP services.
4-2-7-7 Preferred service for international calls via land line/mobile
Skype is the most commonly used service followed by landline/mobile (traditional services) and
Discount International call services. As illustrated in Figure 4-3, “Lower cost” by 59% (59 out of
100) followed by “Convenience” by 27% (27 out of 100) and “Quality” by 12% (12 out of 100)
are the main reasons for choosing a service (or services) for making international calls via
landline/mobile.
12, 12%
27, 27%
59, 59%
2, 2%
Convenience
Friend/family suggestion
Lower cost
Quality
Figure 4- 3 The main reason for choosing a service for international calls via Land line/mobile
The preferred service for international calls via landline/mobile was asked in order to
investigate which service (or services) participants prefer and whether this preference is related
to VoIP privacy/security issues.
The relationship between the preferred service for international calls via landline/mobile and
participants’ concern about VoIP privacy and whether they had discussed security/privacy
issues with their service provider was found to be significant.
77
Chapter 4- Results |
The relationship between the preferred service for international calls via landline/mobile and
participants’ concerns about VoIP privacy indicates that the majority of the respondents who
are not concerned about VoIP privacy (eavesdropping) use Skype. This compares markedly to
those who are concerned about this issue. Furthermore, the relationship reveals that 70.9% (22
out of 31) of the participants who are not concerned about VoIP privacy use Skype, while only
25.8% (8 out of 31) who are concerned about VoIP privacy use Skype. Furthermore, 48.2% (14
out of 29) of the respondents, whether being concerned about VoIP privacy or not, use
landline/mobile (traditional services) for making international calls.
The relationship between the preferred service for international calls via landline/mobile and
whether they had discussed security/privacy issues with their service provider indicates that
the majority of respondents who have never discussed security/privacy issues with their
telephone/VoIP service provider use either landline/mobile (traditional services) or Skype for
making international calls. The relationship also reveals that 100% (29 out of 29) and 90.3% (28
out of 31) of the participants who have not discussed security/privacy issues with their service
provider use landline/mobile (traditional services) and Skype, respectively.
4-2-8-8 Preferred software for making calls/voice chat
Table 4-15 shows that Skype is the most common used software (65.8%, 52 out of 79) followed
by Yahoo! Messenger (11.3%, 9 out of 79) and MSN (0.03%, 3 out of 79). The table also shows
that 73.8% (79 out of 107) use software and 21.5% (23 out of 107) do not use software to make
calla/voice chat.
78
Chapter 4- Results |
Preferred software for making calls/voice chat Frequency
Percent
MSN
3
2.8
N/A
23
21.5
Skype
52
48.5
Yahoo! Messenger
9
8.4
Others
15
14.0
Total
102
Missing
Total
95.3
5
4.7
107
100.0
Table 4-15 Preferred software for making calls/voice chat
In another summation of the evidence, Figure 4-4 shows that “Convenience” (51%, 40 out of
78) is the main reason for choosing the software for making calls/ voice chat, followed by
“Quality” (28%, 22 out of 78), “Friend/family suggestion” (18%, 14 out of 78) and “Security”
(3%, 2 out of 78).
22, 28%
14, 18%
Convenience
2, 3%
40, 51%
Friend/family suggestion
Quality
Security
Figure 4- 4 Reason for choosing software for making calls/ voice chat by computer
It should be pointed out that no relationship was found to exist concerning preferred software
for making calls/voice chat and awareness and attitude towards security/privacy issues in VoIP.
79
Chapter 4- Results |
4-2-2 Awareness/attitude towards VoIP security/privacy
4-2-2-1 Concerned features when making international calls
Figure 4-5 illustrates that the participants are mostly concerned about lower cost (56%, 57 out
of 102) followed by quality (30%, 31 out of 102), convenience (9%, 9 out of 102) and security
(3%, 3 out of 102). It has to be pointed out that two participants answered higher cost and
video as their concerned feature.
3, 3%
2, 2% 9, 9%
Convenience
Lower cost
31, 30%
57, 56%
Quality
Security
Others
Figure 4-5 The most concerned feature when making international calls
The question about concerned feature when making international calls was asked so that the
feature that participants were most concerned about cold be investigated. It is a question that
also referred to VoIP privacy/security issues. As depicted in Figure 4-5, participants are most
concerned about lower cost and less concerned with security.
A significant relationship was found for the most concerned feature when making international
calls and the participants’ concerns about VoIP privacy. This is illustrated in Table 4-16.
80
Chapter 4- Results |
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .008
Concern about VoIP privacy (eavesdropping)
The most concerned feature
Convenience
Yes
Total
2
6
8
25.0%
75.0%
100.0%
0
1
1
%
.0%
100.0%
100.0%
Count
39
17
56
69.6%
30.4%
100.0%
13
18
31
41.9%
58.1%
100.0%
0
3
3
.0%
100.0%
100.0%
1
0
1
100.0%
.0%
100.0%
55
45
100
55.0%
45.0%
100.0%
Count
%
when making international
calls
No
higher cost
Lower cost
Count
%
Quality
Count
%
Security
Count
%
video
Count
%
Total
Count
%
Table 4-16 Relationship between the most concerned feature when making international and participants’ concern about
VoIP privacy
Table 4-16 indicates that the majority of the respondents who are most concerned about
“Lower cost” when making international calls are not concerned about VoIP privacy
(eavesdropping), while most respondents who are most concerned about “Convenience,
Quality and Security” when making international calls are concerned about VoIP privacy
(eavesdropping). The table also reveals that 70.9% (39 out of 55) of the participants who
selected “Lower cost” also answered “No” (not concerned about VoIP privacy). Furthermore,
75% (6 out of 8) of the participants who selected “Convenience”, 58% (18 out of 31) who
selected “Quality” and 100% (3 out of 3) who selected “Security” also answered “Yes”
(concerned about VoIP privacy).
81
Chapter 4- Results |
4-2-2-2 Comparison of security between international/long distance calls and
domestic calls
Table 4-17 shows more respondents (35.5%, 38 out of 107) did not know whether
international/long distance calls are less secure than domestic calls. 27.1% (29 out 107)
believed that international/long distance calls are less secure than domestic calls while 21.5%
(23 out 107) thought the opposite and 14% (15 out 107) believed that both are the same in
terms of security.
Comparison of security between international/long
distance calls and domestic calls
(International/long distance calls are not
more secure than domestic calls)
(International/long distance calls are more
secure than domestic calls)
Frequency
Percent
Don’t know
38
35.5
No
23
21.5
Same
15
14.0
Yes
29
27.1
Total
105
98.1
Missing
2
1.9
Total
107
100.0
Table 4- 17 Are international/long distance calls less secure than domestic calls?
This question was asked in order to investigate participants’ opinions about whether
international/long distance calls are less secure than domestic calls. This question also intends
to find any relationship between the participants’ opinions and VoIP privacy/security issues.
The relationship between participants’ opinions about whether international/long distance calls
are less secure than domestic calls and whether privacy breaches in traditional telephony are
more likely than in VoIP was found to be significant. This is illustrated in Table 4-18.
In fact, Table 4-18 indicates that about half of the respondents (44.8%, 13 out of 29) who think
international/long distance calls are less secure than domestic calls (regardless of the used
service) also believe that privacy breaches are less possible in traditional telephony
(landline/mobile) than in VoIP. Furthermore, almost the same number of participants who were
82
Chapter 4- Results |
not sure whether international/long distance calls are less secure than domestic calls thinks the
opposite about the possibility of privacy breach in VoIP and traditional telephony.
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .013
Comparison of security between international/long distance calls
and domestic calls
Don’t know
Count
%
(International/long distance calls are not
more secure than domestic calls)
No
Count
%
Same
Count
%
(International/long distance calls are more
secure than domestic calls)
Yes
Total
Count
%
Count
%
Possibility of privacy breaches in VoIP
versus traditional telephony
Don’t know
No*
Same
Yes**
Total
18
9
3
8
38
47.4%
23.7%
7.9%
21.1%
100.0%
8
4
3
8
23
34.8%
17.4%
13.0%
34.8%
100.0%
4
1
6
4
15
26.7%
6.7%
40.0%
26.7%
100.0%
5
13
3
8
29
17.2%
44.8%
10.3%
27.6%
100.0%
35
27
15
28
105
33.3%
25.7%
14.3%
26.7%
100.0%
Table 4-18 relationship between participants’ opinion about whether international/long distance calls are less secure than
domestic calls and whether privacy breaches in traditional telephony is more possible or in VoIP
* Possibility of privacy breaches in traditional telephony is not more than possibility of privacy breaches in VoIP
** Possibility of privacy breaches in traditional telephony is more than possibility of privacy breaches in VoIP
4-2-2-3 Privacy concerns when making calls
Table 4-19 shows that 28% (30 out of 107) of the participants selected Scale 4, 24.3% (26 out of
107) selected Scale 2, 19.6% (21 out of 107) selected Scale 1, 15% (16 out of 107) selected Scale
3 and 10.3% (11 out of 107) selected Scale 5.
83
Chapter 4- Results |
Privacy concerns when making calls (Five point scale)
Frequency
Percent
1 (Not concerned)
21
19.6
2
26
24.3
3
16
15.0
4
30
28.0
5 (Very concerned)
11
10.3
Total
104
97.2
Missing
3
2.8
Total
107
100.0
Table 4- 19 Concern about privacy when making calls/ voice chat (Five-point scale)
This question was asked in order to investigate that regardless of the used service, how
concerned are participants about privacy (eavesdropping) when making calls/ voice chat. The
answers reveal that the majority of the participants are not concerned or are little concerned
about privacy (eavesdropping) when making calls/ voice chat.
Specifically, 43.9% (47 out of 107) selected either Scale 1 or 2, highlighting that participants are
not concerned or are little concerned about privacy (eavesdropping) when making calls/ voice
chat, while 38.3% (41 out of 107) selected either Scale 4 or 5, indicating they are seriously
concerned about privacy. Furthermore, 15% (16 out of 107), by selecting Scale 3, indicated that
they are neutral.
This question also intends to find any relationship between the participants’ concerns about
privacy (eavesdropping) when making calls/ voice chat and other VoIP privacy/security issues.
The relationship between participants’ concerns about privacy when making calls (regardless of
the used service) and participants’ concerns about VoIP privacy and security was found to be
significant. This is illustrated in Tables 4-20 and 4-21.
Table 4-20 indicates that the majority of the participants who are concerned about VoIP privacy
are also concerned about privacy when making calls either via traditional telephony or VoIP.
The reverse trend applies for those who are not concerned about VoIP privacy. This group
84
Chapter 4- Results |
selected either Scale 1 or 2 (not or little concerned) indicating regardless of the used service
they are not concerned about privacy when making calls.
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .000
Privacy concerns when making calls
(1=Not concerned, 5=Very concerned)
Concern about VoIP privacy
No
Count
%
(eavesdropping)
Yes
Count
%
Total
Count
%
1
2
3
4
5
Total
20
23
5
8
1
57
35.1%
40.4%
8.8%
14.0%
1.8%
100.0%
1
3
11
21
9
45
2.2%
6.7%
24.4%
46.7%
20.0%
100.0%
21
26
16
29
10
102
20.6%
25.5%
15.7%
28.4%
9.8%
100.0%
Table 4-20 relationship between participants’ concerns about privacy when making calls and participants’ concerns about
VoIP privacy
The table reveals that 75.4% (43 out of 57) of the respondents who selected either Scale 1 or 2
from a five-point scale (not or little concerned about privacy when making calls/voice chat) also
answered “No” (not concerned about privacy when using VoIP). However, 15.7% (9 out of 57)
selected either Scale 4 or 5, which is not consistent with their “No” answer.
Furthermore, 66.6% (30 out of 45) of the respondents selecting either Scale 4 or 5 from a fivepoint scale (very concerned about privacy when making calls/voice chat) also answered “Yes”
(concerned about privacy when using VoIP). Furthermore, 24.4% (11 out of 45) chose Scale 3,
which also indicates their concern about privacy when using VoIP services.
Table 4-21 indicates that the participants’ concerns about privacy when making calls (regardless
of the used service) and participants’ concerns about VoIP privacy are consistent. In both
questions the majority (60.8%, 57 out of 97) of the respondents selected the same scale which
points out that most of them are concerned at the same level about security/privacy regardless
of the used service. The table reveals that 15.4% (15 out of 97) in both questions selected Scale
1, 11.3% (11 out of 97) Scale 2, 10.3% (10 out of 97) Scale 3, 15.4% (15 out of 97) Scale 4 and
8.2% (8 out of 97) Scale 5.
85
Chapter 4- Results |
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .000
Privacy concerns when making calls
(1=Not concerned, 5= Very concerned)
Concern about VoIP
1 (Not concerned)
Count
%
about security
2
Count
%
3
Count
%
4
Count
%
5 (Very concerned)
Total
Count
1
2
3
4
5
Total
15
6
1
3
0
25
4.0%
12.0%
.0%
100.0%
60.0% 24.0%
1
11
1
1
0
14
7.1%
78.6%
7.1%
7.1%
.0%
100.0%
1
4
10
8
0
23
.0%
100.0%
3
25
4.3%
17.4% 43.5% 34.8%
1
3
4.0%
3
12.0% 12.0% 60.0% 12.0%
0
0
0
%
.0%
.0%
.0%
Count
18
24
15
%
15
2
8
20.0% 80.0%
29
11
18.6% 24.7% 15.5% 29.9% 11.3%
100.0%
10
100.0%
97
100.0%
Table 4-21 relationship between participants’ concerns about privacy when making calls and participants’ concerns about
VoIP security
4-2-2-4 Traditional telephony security versus VoIP security
Table 4-22 shows that the majority of the respondents (40.2%, 43 out of 107) believe that
traditional telephony (landline/mobile) is more secure than VoIP while 27.1% (29 out 107) think
the opposite, and 11.2% (12 out 107) believe that both are the same in terms of security. 19.6%
(21 out 107) did not know whether traditional telephony (landline/mobile) is more secure than
VoIP.
Traditional telephony security versus VoIP security
(Traditional telephony is not more
secure than VoIP)
(Traditional telephony is more
secure than VoIP)
Frequency
Percent
Don’t know
21
19.6
No
29
27.1
Same
12
11.2
Yes
43
40.2
Total
105
98.1
Missing
2
1.9
Total
107
100.0
Table 4-22 Is traditional telephony (land line/mobile) more secure than VoIP?
86
Chapter 4- Results |
This question was asked in order to investigate the participants’ opinions about whether
traditional telephony (landline/mobile) is more secure than VoIP. The answers to this question
reveal that participants believe that traditional telephony (landline/mobile) is more secure than
VoIP.
The relationship between participants’ views about whether traditional telephony
(landline/mobile) is more secure than VoIP and whether privacy breaches in traditional
telephony is more possible or in VoIP was found to be significant. This is illustrated in Table 423.
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .002
Possibility of privacy breaches in VoIP versus traditional
telephony
Don’t know
Count
%
(Possibility of privacy breaches in
traditional telephony is not more than No
possibility of privacy breaches in VoIP)
Same
Count
%
Count
%
(Possibility of privacy breaches in
Yes
traditional telephony is more than
possibility of privacy breaches in VoIP)
Count
Total
Count
%
%
Traditional telephony security versus VoIP security
Don’t know
No*
Same
Yes**
Total
12
7
2
14
35
34.3%
20.0%
5.7%
40.0%
100.0%
3
6
2
16
27
11.1%
22.2%
7.4%
59.3%
100.0%
2
3
6
4
15
13.3%
20.0%
40.0%
26.7%
100.0%
4
13
2
9
28
14.3%
46.4%
7.1%
32.1%
100.0%
21
29
12
43
105
20.0%
27.6%
11.4%
41.0%
100.0%
Table 4-23 relationship between participants’ opinion about whether traditional telephony is more secure than VoIP and
whether privacy breaches in traditional telephony is more possible or in VoIP
* Traditional telephony is not more secure than VoIP
** Traditional telephony is more secure than VoIP
Basically, these two questions are similar and target the same notion. The questionnaire was
carefully designed in such a way that the researcher could cross-check the answers.
87
Chapter 4- Results |
Table 4-23 demonstrates that most of those who did not know whether traditional telephony
(landline/mobile) is more secure than VoIP also did not know whether privacy breaches are
more possible when using traditional telephony (landline/mobile) or when using VoIP. The
same trend applies to the participants who answered “Same” in both questions. The table
reveals that only 31.4% (33 out of 105) of the respondents gave identical answers to both
questions and 68.5% (72 out of 105) of the answers are not consistent.
4-2-2-5 Concern about VoIP privacy (eavesdropping)
As shown in Table 4-24, about over half of the participants (53.3%, 57 out of 107) answered
that they are not concerned about privacy (eavesdropping) when using VoIP while 43% (46 out
of 107) answered the opposite.
Concern about VoIP privacy (eavesdropping)
Frequency
Percent
No
57
53.3
Yes
46
43.0
Total
Missing
Total
103
96.3
4
3.7
107
100.0
Table 4-24 Concern about VoIP privacy (eavesdropping)
This question was asked in order to investigate whether the participants are concerned about
privacy (eavesdropping) when make calls using VoIP. The answers to this question reveal that
more of the participants are not concerned about privacy (eavesdropping) when using VoIP.
A significant relationship was found to exist between participants’ concern about privacy
(eavesdropping) when making calls using VoIP and their concern about VoIP security. This is
illustrated in Table 4-25.
88
Chapter 4- Results |
Table 4-25 indicates that the participants’ concern about VoIP privacy (eavesdropping) and VoIP
security is consistent. The majority of the participants who are concerned about VoIP privacy
(eavesdropping) also selected either Scale 4 or 5 (very concerned). This shows they are also
concerned about VoIP security. The same trend applies to those who answered “No” (not
concerned about VoIP privacy) by selecting either Scale 1 or 2 (not or little concerned).
Chi-Square value of the relationship: Pearson Chi-Square - Asymp. Sig. (2-sided): .000
Concern about VoIP Security
(1=Not concerned, 5=Very concerned)
Concern about VoIP privacy
No
Count
%
(eavesdropping)
Yes
Count
%
Total
Count
%
1
2
3
4
5
Total
23
13
11
6
0
53
43.4%
24.5%
20.8%
11.3%
.0%
100.0%
2
1
12
20
9
44
4.5%
2.3%
27.3%
45.5%
20.5%
100.0%
25
14
23
26
9
97
25.8%
14.4%
23.7%
26.8%
9.3%
100.0%
Table 4-25 relationship between participants’ concern about VoIP privacy and VoIP security
The table reveals that 67.9% (36 out of 53) of the respondents who are not concerned about
privacy when using VoIP also selected either Scale 1 or 2 from a five-point scale. This indicates
they are not at all or are little concerned about VoIP privacy when making international calls.
However, only 20.7% (11 out of 53) selected Scale 3 which is not consistent with their “No”
answer. This table also reveals that 65.9% (29 out of 44) of the respondents who are concerned
about VoIP privacy also chose either Scale 4 or 5 from a five-point scale. It suggests that they
are very concerned about VoIP privacy when making international calls. Furthermore, 27.2%
(12 out of 44) selected Scale 3 which also indicates their concern about privacy when using VoIP
services.
89
Chapter 4- Results |
4-2-2-6 Possibility of privacy breaches in VoIP versus traditional telephony
Table 4-26 shows that more of respondents (32.7%, 35 out of 107) did not know whether
privacy breaches are more possible when using traditional telephony (landline/mobile) or when
using VoIP. Nearly one-quarter of participants (26.2%, 28 out 107) believed that traditional
telephony (landline/mobile) is less secure than VoIP while 25.2% (27 out 107) thought the
opposite, and 14% (15 out 107) believed that both are the same in terms of privacy.
This question was asked in order to investigate the participants’ opinions about whether
privacy breaches are more likely to occur when using traditional telephony (landline/mobile) or
when using VoIP. The answers to this question reveal that most of the participants do not know
whether privacy breaches are more likely to occur when using VoIP or when using traditional
telephony (landline/mobile.
Possibility of privacy breaches in VoIP versus traditional telephony
Frequency
Percent
35
32.7
27
25.2
15
14.0
28
26.2
105
98.1
Don’t know
(Possibility of privacy breaches in traditional telephony is No
not more than possibility of privacy breaches in VoIP)
Same
(Possibility of privacy breaches in traditional telephony is Yes
more than possibility of privacy breaches in VoIP)
Total
Missing
2
1.9
Total
107
100.0
Table 4-26 Privacy breach is more possible in traditional telephony or VoIP?
4-2-2-7 Concern about VoIP security
Table 4-27 shows that 24.3% (26 out of 107) of the participants selected Scale 4, 23.4% (25 out
of 107) selected Scale 1, 21.5% (23 out of 107) selected Scale 3, 13.1% (14 out of 107) selected
Scale 2 and 9.3% (10 out of 107) selected Scale 5.
90
Chapter 4- Results |
Concern about VoIP security (Five point scale)
Frequency
Percent
1 (Not concerned)
25
23.4
2
14
13.1
3
23
21.5
4
26
24.3
5 (Very concerned)
10
9.3
Total
98
91.6
System
Missing
Total
9
8.4
107
100.0
Table 4-27 Concerned about VoIP security (Five-point scale)
This question was asked in order to investigate how concerned the participants are about
security issues when making international calls using VoIP.
It emerged that 36.6% (39 out of 107) selected either Scale 1 or 2, revealing that participants
are not concerned or are little concerned about security issues when using VoIP. Furthermore,
33.3% (36 out of 107) selected either Scale 4 or 5, indicating they are seriously concerned about
security. Finally, 21.5% (23 out of 107) chose Scale 3 and this meant that they are neutral about
the issue.
4-2-2-8 Possibility of privacy/security breaches in VoIP
Figure 4-6 illustrates that 82% (55 out of 67) of the answers was valid and 18% (12 out of 67)
irrelevant. There were no invalid answers.
12, 18%
Valid answer
55, 82%
Irrelevant answer
Figure 4- 6 Valid and irrelevant answers
91
Chapter 4- Results |
This question was asked in order to investigate participants’ opinions about the possibility of
privacy and security breaches when using VoIP. Below is a summary of participants’ opinions:
ï‚·
VoIP is less secure than regular landline/mobile services due to the nature of the
technology.
ï‚·
Since VoIP providers offer low-cost services, it is not expected that they offer the best
facilities and privacy.
ï‚·
Security/privacy is not a major concern due to the fact that the content of the
conversations is not security sensitive (calling family, etc.).
ï‚·
Do not talk about anything sensitive/important using VoIP/landline/mobile if you do not
want it to be known.
ï‚·
Conversations are monitored and analyzed by government agencies to protect national
security.
4-2-2-9 Discussing security/privacy issues with service providers
Table 4-28 shows that the majority of the participants (88.8%, 95 out of 107) had never
discussed security/privacy issues with their telephone/VoIP service provider, while only 8% (8
out of 103) did so.
Discussing security/privacy issues with service providers
Frequency
Percent
No
95
88.8
Yes
8
7.5
Total
103
96.3
Missing
4
3.7
Total
107
100.0
Table 4-28 Discussing security/privacy issues with telephone/VoIP service provider
92
Chapter 4- Results |
This question was asked in order to investigate whether the participants had ever discussed
security/privacy issues with their telephone/VoIP service provider. The answers to this question
reveal that most participants had never done this.
4-2-2-10 The discussed security/privacy issues with service providers
As illustrated in Figure 4-7, only 1 answer to this question was valid and relevant. Two answers
were invalid (one was a comment about the questionnaire and the other one was the character
“-”) and 11 were irrelevant. Since no trend could be ascertained because the percentage of
valid answers was so meager, no meaningful summarization can be provided. However, Table
4-30 presents the only valid answer.
The discussed security/privacy issues with service providers
I asked them how secure is their service? and they replied that our encryption method your
call be safe and secure
Table 4-29 The discussed security/privacy issues with service providers
1, 6%
2, 12%
Invalid answer
Irrelevant answer
Valid answer
14, 82%
Figure 4- 7 Valid, invalid and irrelevant answers
93
Chapter 4- Results |
4-5 Summary
The results and findings of the on-line questionnaire are summarized and analyzed using SPSS
and Microsoft Excel 2007. The overview and analysis of on-line questionnaire are presented. In
addition, the relationship between variables were examined (using the chi-square test) and
when a relationship was found to be significant and meaningful, it was explained in more detail.
The next chapter, Chapter 5, discusses the knowledge developed in this thesis. It also describes
the limitations of this study and suggests some possibilities for further research.
94
Chapter 4- Results |
Chapter 5- Discussion
This chapter provides a discussion about the knowledge developed in this study. It is organized
as follows:
Section 5.1
provides an overview of this chapter
Section 5.2
provides a discussion about the results and findings of this research
Section 5.3
describes the limitations of this study
Section 5.4
introduces some possibilities for further research
95
Chapter 5- Discussion |
5-1 Overview
In the previous chapter, the results and findings were presented, and overviews and analysis of
the questions included in the on-line questionnaire were provided. This chapter provides a
discussion of the results and findings, and outlines the limitations in this study. Further avenues
for further research are suggested.
5-2 Discussion of the results and findings
The discussion of the results and findings is presented into two sections, “Background” and
“Awareness/attitude towards VoIP security/privacy”. The Background section provides
discussion about the background characteristics of participants in regard to making calls/voice
chat and their nationality. The second section discusses participants’ awareness and attitudes
towards VoIP security and privacy issues, which are the aims of this research.
5-2-1 Background
5-2-1-1 Nationality
There were no relationships between nationality and awareness/attitude towards
security/privacy issues in VoIP. This is due to the fact that most of the countries (13 out of 18)
had either 1 or 2 participants. Most of the respondents (60%, 64 out of 107) are Australian,
while the rest of the participants (40%, 43 out of 107) are from 17 other countries. Obviously
the sample size is too small to conclude that there is a relationship between nationality and
awareness/attitude towards security/privacy issues in VoIP.
5-2-1-2 Average monthly talking time
The analyses of the findings highlight the following in relation to average monthly talking time:
96
Chapter 5- Discussion |
- Participants who spend more time on phone/mobile dedicate more of their conversation time
to international calls. In all, 93.3% (14 out of 15) of the respondents who use phone/mobile
more than 7 hours per month dedicate more than 3 hours to international calls, while 45.2%
(14 out of 31) who use phone/mobile 1 to 4 hours per month dedicate less than 1 hour per
month to international calls.
- The majority of the respondents who use phone/mobile more than 1 hour per month also use
computers to make calls/voice chat. Furthermore, the majority of the respondents who use
phone/mobile less than 1 hour per month do not use computers to make calls/voice chat.
Analyses indicate that 75.6% (28 out of 37) of the respondents who use phone/mobile 1 to 4
hours per month, 53.3% (8 out of 15) of those who use phone/mobile 4 to 7 hours per month
and 77.5% (31 out of 40) of those who use phone/mobile more than 7 hours per month use
computers to make calls/voice chat. Analysis further shows that 60% (9 out of 15) of the
respondents who use phone/mobile less than 1 hour per month do not use a computer to make
calls/voice chat.
- The majority of those who speak more on phone/mobile also spend more time on computers
making calls/voice chat. Findings show that 65% (26 out of 40) of the respondents who use
phone/mobile more than 7 hours per month spend more than 1 hour per month on computers
for making calls/voice chat, and 60% (9 out of 15) of those who use phone/mobile less than 1
hour per month do not use a computer to make calls/voice chat.
In regard to users’ awareness and attitude towards VoIP privacy and security, the average
monthly talking time is related to the participants’ concern about VoIP privacy and security
issues. Those who speak more are more concerned. However, it has to be pointed out that
although the results highlight that the participants who spend more than 7 hours/month on the
phone/mobile are more concerned about VoIP privacy (eavesdropping) and VoIP security, there
is no technical reason to support this belief. If a VoIP system is vulnerable to privacy/security
breaches, the duration of the communication will not affect the system’s level of security and
97
Chapter 5- Discussion |
consequently will not affect the users. For instance, in Zhu and Fu’s (2011) study, the duration
of Skype calls is not a metric in their proposed traffic analysis attacks on Skype calls. This
indicates that if one uses Skype more often, he or she is not more vulnerable to such attacks.
Similarly, in Benini and Sicari’s (2008) research the risk assessment method they proposed
when assessing the risks of intercepting VoIP calls is not related to the duration of calls.
5-2-1-3 Average monthly international call time
The analyses of the findings highlight the following with reference to average monthly
international call time:
- The time dedicated to international calls when using phone/mobile follows the same pattern
as the time spent on computers for calls/voice chat. Those who spend more (or less) time on
phone/mobile for international calls spend more (or less) time on computers for calls/voice
chat. Less than half (44.0% -11 out of 25) of the respondents who use phone/mobile for less
than 1 hour/month for international calls also spend less than 1 hour/month on computers for
calls/voice chat. The same trend applies to the other categories, 1 hour – 3 hours, more than 3
hours and N/A.
-The respondents who make international calls by phone/mobile use discount international call
services (or international telephone cards) and most respondents who do not make
international calls by phone/mobile use Skype. This is consistent with the findings regarding the
preferred software for making calls/voice chat. Almost all the VoIP free applications in addition
to offering voice and video calls and chats, provide file transfer and instant messaging features.
From this perspective Skype does not offer a unique service. The popularity of Skype is due to
the fact that it is one of the first that targeted the PC-to-PC call market. In addition, the quality
of services offered by Skype is reasonable and the (SkypeOut which enables calls to be placed
from PCs to landlines/mobiles), and PSTN-to-PC (SkypeIn - which enables calls to be placed
from landlines/mobiles to PCs) means that Skype offers a complete solution for making calls.
98
Chapter 5- Discussion |
Skype is so widespread that it is in fact synonymous with PC-to-PC and low cost international
calls.
In regard to users’ awareness and attitudes towards VoIP privacy and security, the average
monthly international call time is similar to the average monthly talking time. Both are related
with the participants’ concern about VoIP privacy and security, and those who speak more are
naturally more concerned. However, as discussed in section 5-2-1-2, from a technical point of
view the duration of the communication has no effect on the system’s security. Therefore the
users who speak more will not be affected.
5-2-1-4 Using computers to make calls/voice chat
The analyses of the findings highlight the followings in relation to the use of computers to make
calls/voice chat:
- The majority of the respondents who use computers to make calls/voice chat spend either 1
hour – 3 hours or more than 3 hours each month doing this. Analyses reveal that 72.6% (53 out
of 73) of the respondents who use computers to make calls/voice chat spend either 1 hour – 3
hours or more than 3 hours, while 37.7% (20 out of 73) spend less than 1 hour every month on
a computer for this purpose.
-The majority of the respondents who use a computer to make calls/voice chat prefer to use it
for making international calls and those who do not use prefer using landline/mobile. Analyses
reveal that 66.6% (48 out of 72) of the respondents who use computers to make calls/voice
chat prefer computers while 33.3% (24 out of 72) prefer landline/mobile to make international
calls.
- The majority of the respondents who use a computer to make calls/voice chat use Skype. 71%
(49 out of 69) of the respondents who use computer to make calls/voice chat use Skype, 0.08%
99
Chapter 5- Discussion |
(6 out of 69) use Yahoo! Messenger, 0.04% (3 out of 69) use MSN and either 0.01% (1 out of 69)
or 0.02% (2 out of 69) use various less common applications.
In regard to users’ awareness and attitude towards VoIP privacy and security, using computers
to make calls/voice chat is related to the participants’ opinions about the possibility of privacy
breaches in VoIP and traditional telephony. The majority of the participants who use computers
for making calls/voice chat believe that privacy breaches are less possible in VoIP than in
traditional telephony. This attitude may refer to the network knowledge that computer users
have. It has been pointed out in Porter et al. (2006a, pp. 114-118) that eavesdropping VoIP is
harder in comparison to eavesdropping PSTN. This is due to the fact that PSTN security is
considered to be physical wire security while for wiretapping VoIP attackers must have access
to the communication channel of VoIP parties. This is due to the distributed environment of IP
networks being more difficult to penetrate.
5-2-1-5 Average monthly use of computer to make calls/voice chat
The analyses of the findings highlight the following in regard to the average monthly use of
computers to make calls/voice chat:
- The majority of the respondents - regardless of the time they spend on a computer for making
calls/voice chat - use Skype. This is consistent with the previous analysis (using computers to
make calls/voice chat) where the majority of the respondents who use computers to make
calls/voice chat do use Skype. Analyses reveal that 55.5% (15 out of 27) of the respondents who
spend 1 to 3 hours/month, 65.3% (17 out of 26) of those who spend more than 3 hours/month,
and 52% (13 out of 25) of those who spend less than 1 hour/month on computers to make
calls/voice chat use Skype.
100
Chapter 5- Discussion |
5-2-1-6 Preferred way to make international calls
The analyses of the findings highlight the followings in relation to the preferred way to make
international calls:
- The majority of the respondents regardless of their preference for using either computers or
landline/mobile for making international calls use Skype. Analyses reveal that 55.5% (30 out of
54) of the respondents who prefer to use computers for international calls and 42% (21 out of
50) of those who prefer landline/mobile over computer use Skype. This indicates that Skype is
the most common service for making international calls either via computer or landline/mobile.
- It is obvious that the reason for choosing a service by those who are most concerned about
“lower cost” when making international calls, is the lower cost that the service offers. However,
the same trend does not apply to those who chose a service for other reasons such as
convenience, friend/family suggestion, quality and security. Analyses reveal that 42.4% (42 out
of 99) of the respondents who are most concerned about lower cost when making international
calls want a service that is cheaper. Therefore, the feature that the respondents are most
concerned about when making international calls matches the reason that they choose a
service for making such calls. This is not the case for those who chose a service for convenience
(74%, 20 out of 27) and lower cost (27.5%, 16 out of 58) when making international calls since
the reason for selecting a service differs from the concerned feature. This may indicate that the
respondents did not accurately answer the questions.
5-2-1-7 Preferred service for international calls via land line/mobile
The analyses of the findings highlight the following concerning the preferred service for making
international calls via landline/mobile:
Skype is the most commonly used service followed by landline/mobile (traditional services) and
Discount International call services. The common factor with “Skype” and “Discount
101
Chapter 5- Discussion |
International call services” is the lower cost that these services offer. In contrast,
“landline/mobile (traditional services)” is more convenient and offers higher quality of service.
However, it can be argued that Skype could be used on landline/mobile; therefore, the
convenience and lower cost factors are addressed.
5-2-1-8 Preferred software for making calls/voice chat
The analyses of the findings highlight the following in relation to the preferred software for
making calls/voice chat:
Convenience followed by quality, friend/family suggestion and security is the main reason for
choosing computer software for making calls/ voice chat. In all, 49.3% (39 out of 79) of the
respondents choose software for convenience, 25.3% (20 out of 79) for quality, 16.4% (13 out
of 79) for friend/family suggestion and only 0.02% (2 out of 79) for security. This clearly
highlighted the fact that respondents are least concerned about security features of the
software they use.
5-2-2 Awareness/attitude towards VoIP security/privacy
5-2-2-1 Concerned features when making international calls
The analyses of the findings highlight the following in relation to the participants’ most
concerned feature when making international calls:
- Participants are most concerned about lower cost followed by quality, convenience and
security. Therefore, they are least concerned about security and this is probably due to the fact
that generally people who make international calls talk to their relatives/friends and the
content of their conversations is not confidential. Confidential and sensitive conversations go
through end-to-end secure lines, which is common in enterprises and government-sensitive
sectors.
102
Chapter 5- Discussion |
- The majority of the respondents who are most concerned about “Convenience, Quality and
Security” when making international calls are concerned about VoIP privacy (eavesdropping). In
contrast, most of those (68.4%, 39 out of 57) who are most concerned about “Lower cost” are
not concerned about VoIP privacy. This demonstrates that when most participants are paying
less for their calls they are not concerned about the privacy of their conversations. This is
consistent with the participants’ opinions about the possibility of privacy and security breaches
in VoIP. Answers reveal that most of the participants did not expect VoIP providers to offer the
best facilities and privacy since they offer low-cost services.
5-2-2-2 Comparison of security between international/long distance calls and
domestic calls
The analyses of the findings highlight the following in relation to the participants’ opinion about
whether international/long distance calls are more secure or domestic calls:
- More of the respondents (35.5%, 38 out of 107) do not know whether international/long
distance calls are less secure than domestic calls. Only 27.1% (29 out 107) believe that
international/long distance calls are less secure than domestic calls. Additionally, 44.8% (13 out
of 29) of the respondents who believe international/long distance calls are less secure than
domestic calls (regardless of the used service) also believe that PSTN is more secure than VoIP.
This is due to the fact that VoIP is much more likely to be used for international than domestic
calls.
5-2-2-3 Privacy concerns when making calls
The analyses of the findings highlight the following in relation to the participants’ opinions
about privacy (eavesdropping) when making calls/ voice chat:
103
Chapter 5- Discussion |
- In all, 43.9% (47 out of 107) of the participants are not concerned or are little concerned about
privacy (eavesdropping) when making calls/ voice chat. In contrast, 38.3% (41 out of 107) of the
participants are seriously concerned about privacy, and 15% (16 out of 107) remained neutral
on this issue.
- The majority of the participants who are concerned about VoIP privacy and VoIP security are
also concerned about privacy when making calls via traditional telephony and vice versa. This
indicates that participants’ concern about privacy/security when making calls is not related to
the service they use. In other words, these participants are concerned about privacy/security
when making calls either by traditional telephony or VoIP.
5-2-2-4 Comparison of VoIP and traditional telephony from privacy/security perspective
The analyses of the findings highlight the following when comparing VoIP and traditional
telephony from the privacy/security perspective:
- The majority of the participants believe that traditional telephony (landline/mobile) is more
secure than VoIP. However, they do not know that the likelihood of privacy breaches in VoIP is
more or the likelihood of privacy breaches in traditional telephony (landline/mobile) is more.
This is in line with Patrick’s (2009, pp. 14-15) study where myths about VoIP security were
addressed. He argues that although it is generally assumed that the traditional phone system
(PSTN) is more secure than VoIP, this is not necessarily true. It has to be noted that PSTN
security is based on physical security. Therefore, an eavesdropper can wiretap PSTN by
physically accessing telephone lines which is much easier to do than to wiretapping VoIP
systems.
104
Chapter 5- Discussion |
5-2-2-5 Concern about VoIP privacy (eavesdropping)/security
The analyses of the findings highlight the followings in relation to participants’ concern about
VoIP privacy (eavesdropping) and VoIP security:
- The majority of the participants neither are concerned about VoIP privacy (eavesdropping) nor
about VoIP security.
- Participants’ concern about VoIP privacy and security is consistent. The majority of those
(65.9%, 29 out of 44) who are concerned about VoIP privacy (eavesdropping) are also
concerned about VoIP security, and the majority of participants (67.9%, 36 out of 53) who are
not concerned about VoIP privacy are also not concerned about VoIP security.
It has to be pointed out that in the on-line questionnaire privacy is considered to be
eavesdropping and VoIP security is considered as other violating actions such as toll fraud.
5-2-2-6 Discussing security/privacy issues with service providers
The analyses of the findings highlight the following in relation to the discussing security and/or
privacy issues with service providers:
- Most of the participants (88.8%, 95 out of 107) never discussed security/privacy issues with
their service provider.
This is in line with participants’ most concerned feature when making calls/voice chat. For
international calls via PSTN participants are most concerned about lower cost (59%, 59 out of
100) and least concerned about security (2%, 2 out of 100). For calls/voice chat via computers
participants are most concerned about convenience (51%, 40 out of 78) and least concerned
about security (3%, 2 out of 78). This indicates that participants either using PSTN or VoIP are
least concerned about security.
105
Chapter 5- Discussion |
5-3 Limitations
One limitation of this study is the total number of the surveyed population. Although a sample
of 107 participants is reasonable out of a population of about 300 students at the CIS, , more
significant findings might be revealed from a larger sample. This is particularly important since
when applying the chi-square test in order to determine if the relationship between variables is
significant, the value of the expected count should be more than 5. When the sample is not
large, some cells in the cross-tabulated tables may have an expected value of less than 5, which
makes the chi-square test unreliable. To avoid this, researchers either combine categories or
increase the sample size. In this study, the researcher could neither combine categories (due to
the nature of the questions) nor increase the sample size (due to time limitation and the long
process of obtaining ethics approval).
Another limitation of this study is that the researcher did not have access to the complete list of
the CIS student population. Consequently, it was not possible to apply truly the Simple Random
Sampling (SRS) method, which is the preferred sampling technique in quantitative studies.
5-4 Further research
Due to time constraints in conducting this study and the difficulties experienced in obtaining
research ethics approval, the surveyed population was limited to the students at the School of
Computer and Information Science, University of South Australia. Further research on this topic
would entail a larger sample population, comprising the general population and students from
other universities.
Although this study attempted to investigate whether there is a relationship between
nationality and awareness/attitude towards security/privacy issues in VoIP, this was not the
major focus of this research. To enrich this study with cross-cultural perspectives, surveys
106
Chapter 5- Discussion |
should be conducted in overseas universities. Finally, some suggestions could be offered to
both VoIP service providers and VoIP users with regard to security/privacy issues.
107
Chapter 5- Discussion |
Chapter 6- Conclusion
The conclusion of this thesis is presented in this chapter
108
Chapter 6- Conclusion |
The purpose of this thesis was to evaluate the users’ awareness of VoIP security vulnerabilities,
and their attitudes towards privacy in VoIP communications.
VoIP technology is widely established and it represents a major trend in telecommunications
where an increasing number of stakeholders are involved. The lower cost and greater flexibility
of VoIP over traditional phone systems are the key drivers of its wide acceptance in both
businesses and individual uses. However, VoIP, like other technologies, while offering
opportunities, introduces security risks as well. Since VoIP uses IP networks to transfer
voice/video/data traffic, it complicates networking security, and it is vulnerable to both VoIP
specific attacks and attacks to the underlying IP network.
VoIP security has been widely studied from the technical and industrial perspectives. No known
research to the best of the researcher’s knowledge has evaluated users’ perspectives on VoIP
security and privacy vulnerabilities. This study evaluated the users’ awareness and attitudes
towards privacy and security issues in VoIP communications. For this reason, an on-line
questionnaire was designed to collect information, and to analyze the collected data
quantitative-statistical techniques were employed.
The findings of this study revealed that the majority of participants are neither concerned
about VoIP privacy (eavesdropping) or VoIP security. They also do not expect to have the best
facilities and privacy features when using VoIP since VoIP providers generally offer low-cost
services. Also, the findings indicate that participants are most concerned about lower cost and
least concerned about security when making international calls. However, most respondents
who make international calls (either using VoIP or traditional telephony, and either by phone or
via computer) are at some level concerned about privacy (eavesdropping). The same trend
applies to domestic and interstate calls as well.
109
Chapter 6- Conclusion |
For other participants where security/privacy is not a major concern, it is believed that the
content of their conversations does not contain sensitive information (calling family, etc.).
However, these participants are concerned about security/privacy issues if they are having a
business/private conversation.
Most of the participants believe that traditional telephony (landline/mobile) is more secure
than VoIP. However, they are not aware that whether the likelihood of privacy breaches in VoIP
is more or the likelihood of privacy breaches in traditional telephony (landline/mobile) is more.
This is does not apply to the majority of the participants who use computers for making
calls/voice chat since they believe that privacy breaches are less possible in VoIP than in
traditional telephony.
It is commonly believed that, regardless of the used service (VoIP/landline/mobile), privacy
breaches are very possible and therefore one should not talk about anything sensitive or
important. There is also a widespread belief that conversations are monitored and analyzed by
governments for reasons of national security.
There is a relationship between conversation duration and awareness and attitude towards
security/privacy issues in VoIP. Those who spend more time talking either by phone or via
computers, are more concerned about security/privacy. However, the respondents who prefer
computers over landline/mobile for international calls are less concerned about VoIP privacy
and vice versa.
Convenience is the main reason for choosing specific software for making calls/voice chat by
computers, although the respondents are least concerned about the security features of the
software they use. In this regard, Skype is the most common service that participants use.
There is no relationship between the time they spend on a computer for making calls/voice
chat and the choice of Skype as software. However, those who speak more on phone/mobile
110
Chapter 6- Conclusion |
also spend more time on computers for making calls/voice chat. Furthermore, most of the
respondents who use computers to make calls/voice chat use Skype.
111
Chapter 6- Conclusion |
Appendix A – Participant information sheet
University of South Australia
Division of Information Technology, Engineering and the Environment
School of Computer and Information Science
Participant information sheet
Name: Alireza Heravi
Qualification: Bachelors’ degree in computer engineering -software
Contact: 0451053463
Research title: “Evaluation of users’ perspective on VoIP security vulnerabilities”
Invitation to participate
You are all invited to participate in this research study by answering an on-line anonymous
questionnaire which will take less than 10 minutes. Participation is voluntary and highly appreciated.
Following provides detailed information about the research.
Purpose of this study
VoIP refers to making calls through computers/ International telephone card/ Skye/ Cheep International
call service providers and etc...
The significance of security issues in voice over IP (VoIP) communications is well known and many
papers have been published to address VoIP’s security vulnerabilities. However so far, no known
research have been conducted to evaluate users’ perspective on these issues.
This study seeks to evaluate the users’ awareness of VoIP security vulnerabilities, and their attitude
towards privacy in VoIP communications. An on-line anonymous questionnaire is designed to collect
information in order to investigate this matter.
Collected information
- The questionnaire is anonymous and no personal information is asked.
112
Appendix A |Participant information sheet
- All records containing personal information will remain confidential and no information which could
lead to identification of any individual will be released.
- The questionnaire only contains questions regarding users’ opinion about VoIP security (e.g. Skype,
voice chat, etc...).
- Since the on-line questionnaire is designed by using Google Docs, the information will be stored at
Google’s server.
- Since the information is stored on Google’s server, it can be assumed that the information is secure
and is only accessible by the researcher.
- This study is a short-term research projects for assessment purposes only and the information will be
stored for 12 months as a computer file (Google Docs spreadsheet).
What the participant will be expected to do:
It is expected that participants only answer the on-line anonymous questionnaire.
Possible risks:
- Since the questionnaire is anonymous, there is no possible risk for participants.
- Participants are free to withdraw from the research project at any stage without affecting their status
now or in the future.
Final research findings
Participants who wish to be provided with the final research findings please contact the researcher
Email: heray004@mymail@unisa.edu.au
The summary of the research findings will be emailed to participants who are keen to have it.
This project has been approved by the University of South Australia's Human Research Ethics
Committee. If you have any ethical concerns about the project or questions about your rights as a
participant please contact the Executive Officer of this Committee, Tel: +61 8 8302 3118; Email:
vicki.allen@unisa.edu.au'
113
Appendix A |Participant information sheet
Appendix B- Recruitment email
Dear All
My name is Alireza Heravi and I’m doing LMCP (Master of Science (Computer and Information Science)
program at UniSA, Division of Information Technology, Engineering and the Environment, School of
Computer and Information Science.
A partial fulfillment of the requirements for LMCP is submitting a thesis. My thesis title is “Evaluation of
users’ perspective on VoIP’s security vulnerabilities”
VoIP refers to making calls through computers/ International telephone card/ Skye/ Cheep
International call service providers and etc...
For this purpose I designed an on-line anonymous questionnaire. The questionnaire aims to explore the
users’ perspective on security and privacy issues while using VoIP services to communicate.
-
Filling the questionnaire will take less than 10 minutes
No personal information is asked.
The online anonymous questionnaire is accessible through the following address:
https://spreadsheets.google.com/viewform?formkey=dHlieHNkX1hQZHZYQVAzd3hCUGVnRHc6MQ
Your participation is highly appreciated
Thank you
Alireza Heravi
114
Appendix B |Recruitment email
Appendix C – Questionnaire
115
Appendix C – Questionnaire |
116
Appendix C – Questionnaire |
117
Appendix C – Questionnaire |
118
Appendix C – Questionnaire |
References
Ahmed, AS & Shaon, RH 2009, 'Evaluation of popular VoIP services', paper presented at the
Adaptive Science & Technology, 2009. ICAST 2009. 2nd International Conference on.
Al-Allouni, H, Rohiem, AE, Hashem, M, El-moghazy, A & Ahmed, AEA 2009, 'VoIP Denial of
service attacks classification and implementation', paper presented at the Radio Science
Conference, 2009. NRSC 2009. National.
Alsmairat, I, Shankaran, R, Orgun, M & Dutkiewicz, E 2009, 'Securing Session Initiation Protocol
in Voice over IP Domain', paper presented at the Dependable, Autonomic and Secure
Computing, 2009. DASC '09. Eighth IEEE International Conference on.
Amaratunga, D, Baldry, D 2001, ‘Case study methodology as a means of theory building:
Performance measurement in facilities management organisations’, Work Study, Vol. 50,
no. 3, pp. 95-105.
Arul, P & Shanmugam, A 2009, ‘Generate a key for AES using biometric for VoIP network
security’ Journal of Theoretical and Applied Information Technology, vol 15, no. 2, viewed 7
June 2010, < http://www.jatit.org/volumes/research-papers/Vol5No2/2Vol5No2.pdf>.
Babbie, E 2001, The practice of learning social research, 9th edn, Wadsworth Thomson
Learning, Belmont, California, USA
Bailey, KD 2007, Methods of Social Research, 4 edn, The Free Press, New York.
Baset, SA & Schulzrinne, HG 2006, 'An Analysis of the Skype Peer-to-Peer Internet Telephony
Protocol', paper presented at the INFOCOM 2006. 25th IEEE International Conference on
Computer Communications. Proceedings.
Baroncelli, F, Martini, B, Martini, V & Castoldi, P 2010, 'Extending next generation network
(NGN) architecture for connection-oriented transport', Computer Communications, vol. In
Press, Corrected Proof.
119
References |
Basicevic, I, Popovic, M & Kukolj, D 2008, 'Comparison of SIP and H.323 Protocols', paper
presented at the Digital Telecommunications, 2008. ICDT '08. The Third International
Conference on, June 29 2008-July 5 2008.
Baumann, R, Cavin, S & Schmid, S 2006, Voice over IP - security and SPIT, Swiss Army, FU Br 41,
KryptDet Report, University of Berne, viewed 15 April 2010, <
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.63.6329&rep=rep1&type=pdf>.
Benini, M & Sicari, S 2008, 'Assessing the risk of intercepting VoIP calls', Computer Networks,
vol. 52, no. 12, pp. 2432-2446.
Berners-Lee, T 1996, 'WWW: past, present, and future', Computer, vol. 29, no. 10, pp. 69-77.
Bonfiglio, D, Mellia, M, Meo, M, Ritacca, N & Rossi, D 2008, 'Tracking Down Skype Traffic', paper
presented at the INFOCOM 2008. The 27th Conference on Computer Communications,
IEEE.
Blaikie, NWH 1991 ‘A critique of the use of triangulation in social research’, Quality and
Quantity, Vol. 25, no. 2, pp. 115-136.
Bonfiglio, D, Mellia, M, Meo, M & Rossi, D 2009, 'Detailed Analysis of Skype Traffic', Multimedia,
IEEE Transactions on, vol. 11, no. 1, pp. 117-127.
Bouma, G 2000, The research process, 4th edn, Oxford University Press, Melbourne, Vic.
Branch, PA, Heyde, A & Armitage, GJ 2009, Rapid identification of Skype traffic flows, ACM,
Williamsburg, VA, USA, pp. 91-96.
Brittain, JE 2005, 'Electrical Engineering Hall of Fame: Alexander Graham Bell', Proceedings of
the IEEE, vol. 93, no. 2, pp. 467-470.
Broesch, JD 1997, 'Signal Acquisition', in Digital Signal Processing Demystified, Newnes,
Burlington, pp. 49-58.
120
References |
Bross, JFM & Meinel, C 2008, 'Can VoIP Live up to the QoS Standards of Traditional Wireline
Telephony?', paper presented at the Telecommunications, 2008. AICT '08. Fourth Advanced
International Conference on, 8-13 June 2008.
Bryman, A 2004, Social research methods, 2ed edn, Oxford University Press.
Butcher, D, Xiangyang, L & Jinhua, G 2007, '15-Security Challenge and Defense in VoIP
Infrastructures', Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE
Transactions on, vol. 37, no. 6, pp. 1152-1162.
Casner, S & Jacobson, V1999, ‘Compressing IP/UDP/RTP headers for low-speed serial links’, IETF
RFC 2508, viewed 22 February 2011, < http://www.faqs.org/rfcs/rfc2508.html >.
Cecez-Kecmanovic, D 2001, ‘Doing Critical IS Research: the Question of Methodology’ in
QualitativeResearch in Information Systems: Issues and Trends, eds EM Trauth, Idea Group
Publishing, Hershey PA, US.
Chen, C-Y, Wu, T-Y, Huang, Y-M & Chao, H-C 2008, 'An efficient end-to-end security mechanism
for IP multimedia subsystem', Computer Communications, vol. 31, no. 18, pp. 4259-4268.
Chen, S-H, Guido, RC, Truong, T-K & Chang, Y 2010, 'Improved voice activity detection algorithm
using wavelet and support vector machine', Computer Speech & Language, vol. 24, no. 3,
pp. 531-543.
Cherry, S 2005, 'Seven myths about voice over IP', Spectrum, IEEE, vol. 42, no. 3, pp. 52-57.
Chua, WF 1986, 'Radical Developments in Accounting Thought', The Accounting Review, vol. 61,
no. 4, pp. 601-632.
Corrocher, N 2003, 'The diffusion of Internet telephony among consumers and firms: Current
issues and future prospects', Technological Forecasting and Social Change, vol. 70, no. 6,
pp. 525-544.
121
References |
Dantu, R, Fahmy, S, Schulzrinne, H & Cangussu, J 2009, 'Issues and challenges in securing VoIP',
Computers & Security, vol. , vol. 28, no. 8, pp. 743-753.
Davidson, J & Peters, J 2000, Voice over IP Fundamentals, Cisco Press, Indianapolis, USA.
Davidson, J, Peters, J, Bhatia, M, Kalidindi, S & Mukherjee, S 2006, Voice over IP Fundamentals,
Second Edition, 2 edn, Cisco Press, Indianapolis, USA.
Degermark, M, Nordgren, B &Pink, S 1999, ‘IP Header Compression’, IETF RFC 2507, viewed 20
February 2011, < http://www.faqs.org/rfcs/rfc2507.html >.
Denzin, NK 1978, The research act: A theoretical introduction to sociological methods, 2nd edn,
McGraw-Hill, New York.
Denzin, NK, Lincoln, YS 2000, ‘Introduction’, in Handbook of Qualitative Research, 2nd edn, eds
NK Denzin & YS Lincoln, Sage Publications, Thousand Oaks, California, pp. 1–30.
De Vaus, DA 1995, Surveys in social research, 4th ed. edn, Allen & Unwin, North Sydney.
Douglas, CS & Tom, L 2004, 'VoIP Security: Not an Afterthought', ACM Queue, vol. 2, no. 6.
Engan, M, Casner, S & Bormann, C 1999, ‘IP Header Compression over PPP’, IETF RFC 2509,
viewed 23 February 2011, < http://www.faqs.org/rfcs/rfc2509.html >.
Engan, M, Casner, S & Bormann, C 2003, ‘IP Header Compression over PPP’, IETF RFC 3544,
viewed 23 February 2011, < http://www.faqs.org/rfcs/rfc3544.html >.
Epstein, J 2009, 'Securing Voice', in Scalable VoIP Mobility, Newnes, Boston, pp. 323-347.
Erzberger, C, Prein, G 1997, ‘Triangulation: Validity and empirically-based hypothesis
construction’, Quality and Quantity, Vol. 31, no. 2, pp. 141-154.
122
References |
Flood, JE 1976, 'Alexander Graham Bell and the invention of the telephone', Electrical
Engineers, Proceedings of the Institution of, vol. 123, no. 12, pp. 1387-1388.
Frost, N 2006, 'VoIP threats - getting louder', Network Security, vol. 2006, no. 3, pp. 16-18.
Gable, GG 1994, 'Integrating case study and survey research methods: an example in
information systems', Eur J Inf Syst, vol. 3, no. 2, pp. 112-126.
Ge, Z, Fischer-Huebner, S, Martucci, LA & Ehlert, S 2009, 'Revealing the Calling History of SIP
VoIP Systems by Timing Attacks', paper presented at the Availability, Reliability and
Security, 2009. ARES '09. International Conference on.
Geneiatakis, D, Kambourakis, G, Dagiuklas, T, Lambrinoudakis, c & Gritzalis, S 2005, SIP Security
Mechanisms: A state-of-the-art review, Department of Information and Communication
Systems Engineering, University of the Aegean, viewed on 10 April 2010,
<http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.105.7241&rep=rep1&type=pd
f >.
Geneiatakis, D, Dagiuklas, T, Kambourakis, G, Lambrinoudakis, C, Gritzalis, S, Ehlert, KS &
Sisalem, D 2006, 'Survey of security vulnerabilities in session initiation protocol',
Communications Surveys & Tutorials, IEEE, vol. 8, no. 3, pp. 68-81.
Geneiatakis, D & Lambrinoudakis, C 2007, 'An ontology description for SIP security flaws',
Computer Communications, vol. 30, no. 6, pp. 1367-1374.
Glasmann, J, Kellerer, W & Muller, H 2001, 'Service development and deployment in H.323 and
SIP', paper presented at the Computers and Communications, 2001. Proceedings. Sixth IEEE
Symposium on, 2001.
Glasmann, J, Kellerer, W & Muller, H 2003, 'Service architectures in H.323 and SIP: A
comparison', Communications Surveys & Tutorials, IEEE, vol. 5, no. 2, pp. 32-47.
Glesne, C, Peshkin, A 1992, Becoming a qualitative researcher: An introduction, Longman, New
York.
123
References |
Goel, V & Dolan, RJ 2004, 'Differential involvement of left prefrontal cortexin inductive and
deductive reasoning', Cognition, vol. 93, no. 3, pp. B109-B121.
Goode, B 2002, 'Voice over Internet protocol (VoIP)', Proceedings of the IEEE, vol. 90, no. 9, pp.
1495-1517.
Gritzalis, D & Mallios, Y 2008, 'A SIP-oriented SPIT Management Framework', Computers &
Security, vol. 27, no. 5-6, pp. 136-153.
Groom, FM & Groom, KM 2004, The Basics of Voice over Internet Protocol, International
Engineering Consortium, Chicago.
Guarte, J & Barrios, E 2006, 'Estimation Under Purposive Sampling', Communications in
Statistics: Simulation & Computation, vol. 35, no. 2, pp. 277-284.
Gupta, P & Shmatikov, V 2007, 'Security Analysis of Voice-over-IP Protocols', paper presented at
the Computer Security Foundations Symposium, 2007. CSF '07. 20th IEEE.
Hall, DJ 1996, Practical social research: project work in the community, MacMillan, Houndmills,
Basingstoke, Hampshire.
Hammersley, M 1995, The politics of social research, Sage Publications, London.
Handa, A 2009, 'Introduction to IMS', in System Engineering For IMS Networks, Newnes,
Burlington, pp. 1-24.
Hanes, D & Salgueiro, G 2008, Fax, Modem, and Text for IP Telephony, Cisco Press, Indianapolis,
USA.
Henry, GT 1990, Practical sampling, Sage Publications, Newbury Park.
124
References |
Hirschheim, RA 1985, ‘Information Systems Epistemology: An Historical Perspective, London
School of Economics, viewed 7 January 2011,
<http://areadocenti.eco.unicas.it/virili/TerracinaRW/Kit/HirschheimISEpistemology.pdf>.
Hong, L & Mouchtaris, P 2000, 'Voice over IP signaling: H.323 and beyond', Communications
Magazine, IEEE, vol. 38, no. 10, pp. 142-148.
Howcroft, D, Trauth, EM 2004, ‘The Choice of Critical Information Systems Research’ in
Information Systems Research: Relevant Theory and Informed Practice, B Kaplan, DP Truex,
D Wastell, AT Wood-Harper & JI DeGross, Kluwer Academic Publishers Boston, US.
Huang, H & Lin, F 2009, 'A speech feature extraction method using complexity measure for
voice activity detection in WGN', Speech Communication, vol. 51, no. 9, pp. 714-723.
Huang, H, Yu, H-T & Feng, X-L 2009, 'A SPIT Detection Method Using Voice Activity Analysis',
paper presented at the Multimedia Information Networking and Security, 2009. MINES '09.
International Conference on, 18-20 Nov. 2009.
Jick, TD 1979, 'Mixing Qualitative and Quantitative Methods: Triangulation in Action',
Administrative Science Quarterly, vol. 24, no. 4, pp. 602-611.
Johnson, RB & Onwuegbuzie, AJ 2004, 'Mixed Methods Research: A Research Paradigm Whose
Time Has Come', Educational Researcher, vol. 33, no. 7, pp. 14-26.
Kaplan, B & Duchon, D 1988, 'Combining Qualitative and Quantitative Methods in Information
Systems Research: A Case Study', MIS Quarterly, vol. 12, no. 4, pp. 571-586.
Karam, MJ & Tobagi, FA 2001, 'Analysis of the delay and jitter of voice traffic over the Internet',
paper presented at the INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE
Computer and Communications Societies. Proceedings. IEEE, 2001.
Karapantazis, S & Pavlidou, F-N 2009, 'VoIP: A comprehensive survey on a promising
technology', Computer Networks, vol. 53, no. 12, pp. 2050-2090.
125
References |
Klauer, KJ 1996, 'Teaching inductive reasoning: some theory and three experimental studies',
Learning and Instruction, vol. 6, no. 1, pp. 37-57.
Klein, HK, Myers, MD 1999, ‘A Set of Principles for Conducting and Evaluating Interpretive Field
Studies in Information Systems’, MIS Quarterly, vol. 23, no. 1, pp. 67-94.
Kleinrock, L 2008, 'History of the Internet and its flexible future', Wireless Communications,
IEEE, vol. 15, no. 1, pp. 8-18.
Kopsidas, S, Zisiadis, D & Tassiulas, L 2006, 'Voice Interactive Personalized Security (VoIPSEC)
protocol: Fortify Internet telephony by providing end-to-end security through inbound key
exchange and biometric verification', paper presented at the Hot Topics in Web Systems
and Technologies, 2006. HOTWEB '06. 1st IEEE Workshop on, 13-14 Nov. 2006.
Koren, T, Casner, S, Geevarghese, J, Thompson, B & Ruddy, P 2003, ‘Enhanced Compressed RTP
(CRTP) for Links with High Delay, packet Loss and Reordering’, IETF RFC 3545, viewed 20
February 2011, < http://www.faqs.org/rfcs/rfc3545.html >.
Kuhn, DR, Walsh, JT & Fries, S 2005, Security Considerations for Voice Over IP Systems, National
Institute of Standards and Technology, U.S. Department of Commerce, viewed on 10 April
2010, <http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf>.
Lee, AS 1989, 'A Scientific Methodology for MIS Case Studies', MIS Quarterly, vol. 13, no. 1, pp.
33-50.
Lee, AS 1991, 'Integrating Positivist and Interpretive Approaches to Organizational Research',
Organization Science, vol. 2, no. 4, pp. 342-365.
Lincoln, YS, Guba, EG 1985, Naturalistic Inquiry, Sage Publications, Newbury Park, California.
Liu, Z, Martensson, A, Miyazaki, A, Svanbro, K, Wiebke, T, Yoshimura, T & Zheng, H 2001,
‘RObust Header Compression (ROHC): Framework and Four Profiles: RTP, UDP, ESP, and
Uncompressed’, IETF RFC 3095, viewed 23 February 2011, <
http://www.faqs.org/rfcs/rfc3095.html >.
126
References |
Lukasik, S 2010, 'Why The ARPANET Was Built', Annals of the History of Computing, IEEE, vol.
PP, no. 99, pp. 1-1.
Markus, ML 1983, 'Power, Politics, and MIS Implementation', Communications of the ACM, vol.
26, no. 6, pp. 430-444.
Martínez Perea, R 2008, 'The IMS', in Internet Multimedia Communications Using SIP, Morgan
Kaufmann, Burlington, pp. 501-540.
Mathison, S 1988, 'Why Triangulate?', Educational Researcher, vol. 17, no. 2, pp. 13-17.
Mingers, J 2001, 'Combining IS Research Methods: Towards a Pluralist Methodology',
Information Systems Research, vol. 12, no. 3, pp. 240-259.
Mohapatra, SK 2009, 'Integrated planning for Next Generation Networks', paper presented at
the Integrated Network Management-Workshops, 2009. IM '09. IFIP/IEEE International
Symposium on, 1-5 June 2009.
Mu, x, ller, J & Massoth, M 2010, 'Defense against Direct Spam over Internet Telephony by
Caller Pre-validation', paper presented at the Telecommunications (AICT), 2010 Sixth
Advanced International Conference on, 9-15 May 2010.
Myers, MD 1997a, 'Qualitative Research in Information Systems', MIS Quarterly, vol. 21, no. 2,
pp. 241-242.
Myers, MD 1997b, 'Qualitative Research in Information Systems', MIS Quarterly, viewed 7
January 2011, <http://www.qual.auckland.ac.nz/>.
Myers, MD 2009, Qualitative Research in Business & Management, Sage Publications, London.
Neuman, WL 2003, Social research methods: Qualitative and quantitative approaches, 5th edn,
Allyn and Bacon, Boston.
127
References |
O'Neill, JE 1995, 'The role of ARPA in the development of the ARPANET, 1961-1972', Annals of
the History of Computing, IEEE, vol. 17, no. 4, pp. 76-81.
Oouch, H, Takenaga, T, Sugawara, H & Masugi, M 2002, 'Study on appropriate voice data length
of IP packets for VoIP network adjustment', paper presented at the Global
Telecommunications Conference, 2002. GLOBECOM '02. IEEE, 17-21 Nov. 2002.
Orlikowski, WJ & Baroudi, JJ 1991, 'Studying Information Technology in Organizations: Research
Approaches and Assumptions', Information Systems Research, vol. 2, no. 1, pp. 1-28.
Patrick, P 2009, Voice over IP Security, Cisco Press, Indianapolis, USA.
Perenyi, M, Gefferth, A, Trang Dinh, D & Molnar, S 2007, 'Skype Traffic Identification', paper
presented at the Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE.
Piccard, P 2006, 'Skype Security', in Syngress Force Emerging Threat Analysis, Syngress,
Rockland, pp. 103-121.
Porter, T 2006, 'Threats to VoIP Communications Systems', in Syngress Force Emerging Threat
Analysis, Syngress, Rockland, pp. 3-25.
Porter, T & Gough, M 2007, 'Skype Security', in How to Cheat at VoIP Security, Syngress,
Burlington, pp. 253-262.
Porter, T, Kanclirz, J, Zmolek, A, Rosela, A, Cross, M, Chaffin, L, Baskin, B & Shim, C 2006a, 'PSTN
Architecture', in Practical VoIP Security, eds. P Thomas, K Jan, Z Andyet al, Syngress,
Burlington, pp. 91-121.
Porter, T, Kanclirz, J, Zmolek, A, Rosela, A, Cross, M, Chaffin, L, Baskin, B & Shim, C 2006 b, ' The
IP Multimedia Subsystem: True Converged Communications', in Practical VoIP Security,
Syngress, Burlington, pp. 499-517.
128
References |
Quittek, J, Niccolini, S, Tartarelli, S, Stiemerling, M, Brunner, M & Ewald, T 2007, 'Detecting SPIT
Calls by Checking Human Communication Patterns', paper presented at the
Communications, 2007. ICC '07. IEEE International Conference on, 24-28 June 2007.
Quittek, J, Niccolini, S, Tartarelli, S & Schlegel, R 2008, 'On Spam over Internet Telephony (SPIT)
Prevention', Communications Magazine, IEEE, vol. 46, no. 8, pp. 80-86.
Ragin, CC 1987, The Comparative Method: Moving Beyond Qualitative and Quantitative
Strategies, University of California Press, Berkeley, Los Angeles and London.
Richardson, T 2007, 'Next Generation Network Management', in The Cable and
Telecommunications Professionals' Reference (Third Edition), ed. H Goff, Focal Press,
Boston, pp. 207-224.
Rose, G 1982, Deciphering sociological research, Macmillan, London.
Rufi, A 2007, Network Security 1 and 2 Companion Guide (Cisco Networking Academy), Cisco
Press, Indianapolis, USA.
Sarrocco, C & Ypsilanti, D 2007, ‘Convergence and next generation networks’, ministerial
background report 2, Organization for Economic Cooperation and Development (OECD),
viewed 9 March 2011, <http://www.oecd.org/dataoecd/25/11/40761101.pdf>.
Schulzrinne, H & Rosenberg, J 1998a, ‘A Comparison of SIP and H.323 for Internet Telephony’,
proceedings of the 1998 Workshop on Network and Operating System Support for Digital
Audio and Video (NOSSDAV '98), July 1998, Cambridge, England.
Schulzrinne, H & Rosenberg, J 1998b, 'Signaling for Internet telephony', paper presented at the
Network Protocols, 1998. Proceedings. Sixth International Conference on, 13-16 Oct 1998.
Schulzrinne, H & Rosenberg, J 1999, 'Internet Telephony: architecture and protocols - an IETF
perspective', Computer Networks, vol. 31, no. 3, pp. 237-255.
129
References |
Schulzrinne, H & Rosenberg, J 2000, 'The Session Initiation Protocol: Internet-centric signaling',
Communications Magazine, IEEE, vol. 38, no. 10, pp. 134-141.
Sengar, H, Zhen, R, Haining, W, Wijesekera, D & Jajodia, S 2010, 'Tracking Skype VoIP Calls Over
The Internet', paper presented at the INFOCOM, 2010 Proceedings IEEE, 14-19 March 2010.
Shanks, G 2002, 'Guidelines for Conducting Positivist Case Study Research in Information
Systems', Australasian Journal of Information Systems, vol. 10, no. 1.
Simon, M & Slay, J 2010, 'Recovery of Skype Application Activity Data from Physical Memory',
paper presented at the Availability, Reliability, and Security, 2010. ARES '10 International
Conference on, 15-18 Feb. 2010.
Sisalem, D, Kuthan, J & Ehlert, S 2006, 'Denial of service attacks targeting a SIP VoIP
infrastructure: attack scenarios and prevention mechanisms', Network, IEEE, vol. 20, no. 5,
pp. 26-31.
Srivatsa, M, Iyengar, A, Liu, L & Jiang, H 2010, 'Privacy in VoIP Networks: Flow Analysis Attacks
and Defense', Parallel and Distributed Systems, IEEE Transactions on, vol. PP, no. 99, pp. 11.
Stanton, R 2006, 'Secure VoIP - an achievable goal', Computer Fraud & Security, vol. 2006, no. 4,
pp. 11-14.
Strauss, AC, Corbin, JM 1998, Basics of Qualitative Research: Techniques and Procedures for
Developing Grounded Theory, 2ed edn, Sage Publications, London.
Sudman, S 1976, Applied sampling, Academic Press, New York.
Sundquist, J & Service, N 2006, Top 10 Myths about VoIP, Epygi Technologies Ltd., viewed on 3
March 2011, <http://www.epygi.com/pdf/WhitePapers/Epygi%20white%20paper%20%2010%20VoIP%20Myths.pdf>.
130
References |
Thom, GA 1996, 'H.323: the multimedia communications standard for local area networks',
Communications Magazine, IEEE, vol. 34, no. 12, pp. 52-56.
Trochim, WMK 2006, The Research Methods Knowledge Base, 2nd edition, viewed 4 January
2011, <http://www.socialresearchmethods.net/kb/dedind.php>.
Varey, R J, Wood-Harper, T, Wood, R 2002, ‘A theoretical review of management and
information systems using a critical communications theory’, Journal of Information
Technology, vol.17, no. 4, pp. 229-240.
Varshney, U, Snow, A, McGivern, M & Howard, C 2002, 'Voice over IP', Commun. ACM, vol. 45,
no. 1, pp. 89-96.
Venkatesha Prasad, R, Sangwan, A, Jamadagni, HS, Chiranth, MC, Sah, R & Gaurav, V 2002,
'Comparison of voice activity detection algorithms for VoIP', paper presented at the
Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International
Symposium on, 2002.
VOIPSA, 2005, ‘VoIP Security and Privacy Threat Taxonomy’ viewed on 27 February 2011,
<http://www.voipsa.org/Activities/VOIPSA_Threat_Taxonomy_0.1.pdf>.
Wallingeord, T 2006, VoIP HACKS Tips & Tools for Internet Telephony, O'reilly, Sebastopol, CA,
US.
Walsh, TJ & Kuhn, DR 2005, 'Challenges in securing voice over IP', Security & Privacy, IEEE, vol.
3, no. 3, pp. 44-49.
Wang, X, Chen, S & Jajodia, S 2005, Tracking anonymous peer-to-peer VoIP calls on the internet,
ACM, Alexandria, VA, USA, pp. 81-91
Wang, X, Zhang, R, Yang, X, Jiang, X & Wijesekera, D 2008, Voice pharming attack and the trust
of VoIP, ACM, Istanbul, Turkey, pp. 1-11.
Warwick, DP 1975, The sample survey: theory and practice, McGraw-Hill, New York.
131
References |
Weisberg, HF 1977, An introduction to survey research and data analysis, W. H. Freeman, San
Francisco.
Yates, F 1960, Sampling methods for censuses and surveys, 3rd ed., revised and enlarged. edn,
C. Griffin, London.
Ye, Z, Yuanchao, L, Vikram, A & Huirong, F 2009, 'On Privacy of Skype VoIP Calls', paper
presented at the Global Telecommunications Conference, 2009. GLOBECOM 2009, IEEE.
Yu-Sung, W, Bagchi, S, Singh, N & Wita, R 2009, 'Spam detection in voice-over-IP calls through
semi-supervised clustering', paper presented at the Dependable Systems & Networks,
2009. DSN '09. IEEE/IFIP International Conference on, June 29 2009-July 2 2009.
Zhang, R, Wang, X, Farley, R, Yang, X & Jiang, X 2009a, On the feasibility of launching the manin-the-middle attacks on VoIP from remote attackers, ACM, Sydney, Australia, pp. 61-69.
Zhang, R, Wang, X, Yang, X, Farley, R & Jiang X 2009b, ‘An Empirical Investigation into the
Security of Phone Features in SIP-Based VoIP Systems’, ISPEC pp. 59-70.
Zhu, Y & Fu, H 2010, 'Traffic analysis attacks on Skype VoIP calls', Computer Communications,
vol. In Press, Corrected Proof.
Zisiadis, D, Kopsidas, S & Tassiulas, L 2007a, 'An Architecture for Secure VoIP and Collaboration
Applications', paper presented at the Security, Privacy and Trust in Pervasive and
Ubiquitous Computing, 2007. SECPerU 2007. Third International Workshop on, 19-19
July 2007.
Zisiadis, D, Kopsidas, S & Tassiulas, L 2007b, 'Voice Interactive Personalized Security Protocol:
Definition and Security Analysis', paper presented at the Secure Network Protocols,
2007. NPSec 2007. 3rd IEEE Workshop on, 16-16 Oct. 2007.
132
References |
Download