Editorial Notes
NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2019 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.
ABSTRACT
Interconnecting voice service providers require a mutual trust between communicating entities, which are built either using bilateral agreements or intermediary service provider. To achieve such relationship between Anonymous Service Providers we should have an automated mechanism. In this paper, we propose a conceptual architecture that can build such relationship between communicating Anonymous Service Providers. By applying this architecture, we argue that we can increase efficiency, security, and performance of service provider's networks. The impact of internet speed on the interconnection network is measured using key metrics including ACD, ASR, PDD, NER, and MOS.
- Dalton, J. P., & Isakbayev, D. (2016). U.S. Patent No. 9,392,033. Washington, DC: U.S. Patent and Trademark Office.Google Scholar
- Mourad, H. (2015). The Fall of SS7-How Can the Critical Security Controls Help?. SANS Institute InfoSec Reading Room.Google Scholar
- Jensen, K., Nguyen, H. T., Van Do, T., & Arnes, A. (2017). A big data analytics approach to combat telecommunication vulnerabilities. Cluster Computing, 20(3), 2363--2374.Google ScholarDigital Library
- Welch, B. (2017). Exploiting the weaknesses of SS7. Network Security, 2017(1), 17--19.Google ScholarDigital Library
- Fernandez, E. B., Pelaez, J. C., & Larrondo-Petrie, M. M. (2007, March). Security patterns for voice over ip networks. In Computing in the Global Information Technology, 2007. ICCGI 2007. International Multi-Conference on (pp. 33--33). IEEE.Google Scholar
- Keshavarz, H., Sattari, M. R. J., & Noor, R. M. (2012). Session initiation protocol attacks and challenges. arXiv preprint arXiv:1205.0480.Google Scholar
- Paczkowski, L. W., Rajagopal, A., & Marquardt, R. R. (2017). U.S. Patent Application No. 15/496,465.Google Scholar
- Handley, M., Perkins, C., & Jacobson, V. (2006). SDP: session description protocol.Google ScholarDigital Library
- Rosenberg, J., & Schulzrinne, H. (2002). An offer/answer model with session description protocol (SDP) (No. RFC 3264).Google ScholarDigital Library
- Beck, C. C., Sidell, M., Gold, T., Powers, J., & Knuff, C. (2006). U.S. Patent Application No. 11/237,269.Google Scholar
- Andreasen, F., Baugher, M., & Wing, D. (2006). Session description protocol (SDP) security descriptions for media streams (No. RFC 4568).Google ScholarDigital Library
- Peterson, J. (2004). S/MIME advanced encryption standard (AES) requirement for the session initiation protocol (SIP) (No. RFC 3853).Google ScholarDigital Library
- Ramsdell, B. (1999). S/MIME version 3 message specification (No. RFC 2633).Google ScholarDigital Library
- TCF (2012), IP Interconnection for voice Technical Standards, New Zealand Telecommunications Forum. https://www.tcf.org.nzGoogle Scholar
- Agbamuche, U. (2015). In Favour of the Interconnect Clearinghouse Model. The communicator. Retrieved from https://www.ncc.gov.ngGoogle Scholar
- What Drives Global VoIP Services Market Growth in 2017. (2017, November 13). Retrieved from https://semacom.ca/drives-global-voip-services-market-growth-2017/Google Scholar
- Chan, K. C., Zhou, X., Gururajan, R., & Barua, P. (2018). A set of quality metrics for the evaluation of voice termination services. In 2018 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC) (pp. 138--143). IEEE.Google ScholarCross Ref
- Holub, J., Wallbaum, M., Smith, N., & Avetisyan, H. (2018). Analysis of the Dependency of Call Duration on the Quality of VoIP Calls. IEEE Wireless Communications Letters, 7(4), 638--641.Google ScholarCross Ref
- Yondra, D., Hariyawan, M. Y., & Dwiyono, W. (2015). Design & Construction Automatic Pdd (Post Dialing Delay) Tester For Pstn Line. Jurnal Aksara Elementer, 4(1).Google Scholar
Index Terms
- A new architecture for voice interconnection using packet switched network
Recommendations
A VoIP system for mobility voice security support using the VPN
Voice over internet protocol (VoIP) provided voice service using Internet. It receives footlights when it escapes an initial curiosity. Interest to VoIP increased, because it can transfer existing phone service and deliver voice data through Internet ...
ASR System Integration with Asterisk for SIP or IAX Softphone Clients
IACSIT-SC '09: Proceedings of the 2009 International Association of Computer Science and Information Technology - Spring ConferenceThis paper provides an insight into the integration of Automatic Speech Recognition with VoIP based Asterisk PBX Server. Softphones are used as VoIP clients which uses SIP and IAX as primary communication protocols to connect to Asterisk PBX Server. A ...
Facilitating Mobile Service Provisioning in IP Multimedia Subsystem (IMS) Using Service Oriented Architecture
ICSOC '07: Proceedings of the 5th international conference on Service-Oriented ComputingThis paper presents an extension of the IMS software architecture using a service orientation, which provides flexibility of mobile service provisioning. The suggested extension facilitates composition of new mobile services in run-time based on the ...
Comments