VOIP and data storage in wireless GSM modem over MANET area

P. Sachin, S. Tamrakar
{"title":"VOIP and data storage in wireless GSM modem over MANET area","authors":"P. Sachin, S. Tamrakar","doi":"10.1109/ICE-CCN.2013.6528595","DOIUrl":null,"url":null,"abstract":"VOIP communication done by IP but we know that IP spoofed attacks are the major problems to the current internet and defense communication in VOIP. Most networks today use TCP/IP protocol as the standard to communicate with each other. Each host in the network is uniquely identified by its IP address. In TCP/IP architecture, there is no way to check authorization of source IP. So attackers can easily target source IP address in IP header. In this paper, we have proposed a method to verify authentication of source IP address. We identify the attacks by comparing IP address, corresponding MAC address and BIOS serial number with register database. Detected spoofing was maintained in a log. Our method is very simple and efficient as it will perform in MANET area. Thus it is effective method to identify IP and MAC spoofed attacks. I will construct the secured VOIP communication over MANET area using TCP / IP and storage Data in GSM modem as SMS (inbox). Finally using IP and MAC get fail to prevent spoofing attack then DoS attack prevent using BIOS serial number of clients.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICE-CCN.2013.6528595","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

VOIP communication done by IP but we know that IP spoofed attacks are the major problems to the current internet and defense communication in VOIP. Most networks today use TCP/IP protocol as the standard to communicate with each other. Each host in the network is uniquely identified by its IP address. In TCP/IP architecture, there is no way to check authorization of source IP. So attackers can easily target source IP address in IP header. In this paper, we have proposed a method to verify authentication of source IP address. We identify the attacks by comparing IP address, corresponding MAC address and BIOS serial number with register database. Detected spoofing was maintained in a log. Our method is very simple and efficient as it will perform in MANET area. Thus it is effective method to identify IP and MAC spoofed attacks. I will construct the secured VOIP communication over MANET area using TCP / IP and storage Data in GSM modem as SMS (inbox). Finally using IP and MAC get fail to prevent spoofing attack then DoS attack prevent using BIOS serial number of clients.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无线GSM调制解调器在MANET区域的VOIP和数据存储
VOIP通信是通过IP进行的,但IP欺骗攻击是当前网络和VOIP防御通信的主要问题。当今大多数网络都使用TCP/IP协议作为相互通信的标准。网络中的每台主机都由其IP地址唯一标识。在TCP/IP体系结构中,没有办法检查源IP的授权。因此攻击者可以很容易地将IP头中的源IP地址作为攻击目标。在本文中,我们提出了一种验证源IP地址认证的方法。我们通过比较IP地址、对应的MAC地址和BIOS序列号与注册数据库进行识别。在日志中维护检测到的欺骗。我们的方法是非常简单和有效的,因为它将执行在MANET领域。因此是识别IP和MAC欺骗攻击的有效方法。我将构建安全的VOIP通信在MANET区域使用TCP / IP和存储数据在GSM调制解调器作为短信(收件箱)。最后使用IP和MAC get无法防止欺骗攻击,然后使用客户端的BIOS序列号阻止DoS攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Removing snow from an image via image decomposition Maximum a posteriori adaptation method for video semantic indexing Low power 8×8 Sum of Absolute Difference engine for Motion Estimation in video compression A modified preamble structure based carrier frequency offset (CFO) and phase noise compensation in an OFDM system Multiple learning based classifiers using layered approach and Feature Selection for attack detection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1