METHODS FOR ENHANCING SECURITY IN IP TELEPHONY
DOI:
https://doi.org/10.20535/2411-2976.22025.55-62Keywords:
IP telephony, VoIP, SIP, RTP, securityAbstract
Background. The widespread adoption of IP telephony in corporate and operator networks has led to an increased risk of cyber threats such as fraud, eavesdropping, service interruptions and unauthorised access. Unlike traditional telephony, IP-based systems inherit all the vulnerabilities of IP networks, requiring a systematic, multi-layered approach to security.
Objective. The purpose of the paper is to present and analyse methods for enhancing the security of IP telephony systems. The focus is placed on protecting signalling and media traffic, preventing fraud, ensuring the integrity and confidentiality of communications, and maintaining service availability in the presence of attacks.
Methods. The research involves analysing potential threats for IP telephony systems and various protecting methods such as Encryption for VoIP traffic, Configuration Authentication, Separation of VoIP and Data Traffic, Firewalls and Session Border Controllers (SBCs) which are widely used, Intrusion detection and prevention systems(IDPS), AI and Machine Learning for Real-Time Threat Detection, Blockchain for Security and Authentication which are the future of IP telephony security.
Results. The analysis shows that there is no single universal solution capable of comprehensively protecting IP telephony; instead, effective security is achieved through the combination of multiple complementary mechanisms. For each major threat class, well-established countermeasures and best practices are identified. Current trends in security development for IP telephony systems were analysed.
Conclusions. The conducted review indicates that enhancing security in IP telephony is primarily a question of systematically applying and combining already known methods. The surveyed techniques provide a solid basis for protecting confidentiality, integrity and availability of IP-based voice services. Furthermore, modern technologies like blockchain, artificial intelligence, and machine learning allow experimenting and implementing new methods of IP telephony security enhancement.
References
Muhammad Yeasir Arafat, Feroz Ahmed & M Abdus Sobhan(2013), SIP Security in IP Telephony, Conference: Proc. of ElasticWorld 2013, pp. 1-11. Retrieved from: https://www.researchgate.net/publication/291833783_SIP_Security_in_IP_Telephony
Mosleh M. Abualhaj, Sumaya N. Al-Khatib, Qusai Y. Shambour, Ahmad Adel Abu-Shareha(2021), An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks, CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 21, No 4, pp.145-157. Retrieved from: https://www.researchgate.net/publication/356946930_An_Efficient_Method_to_Enhance_IP_Telephony_Performance_in_IPV6_Networks
Martin Klimo, Tatiana Kováčiková, Pavol Segeč(2004), SELECTED ISSUES OF IP TELEPHONY, Communications - Scientific letters of the University of Zilina 6(4), pp. 63-70. Retrieved from: https://www.researchgate.net/publication/291432188_Selected_issues_of_IP_telephony
IETF Network Working Group. 2016. SIP: Session Initiation Protocol. Retrieved September 21, 2016 from https://www.ietf.org/rfc/rfc3261.txt
Fedorov S., Novohrudska R.(2025), OVERVIEW OF SIP BASED ATTACKS IN VOIP NETWORKS, International Scientific Conference “Modern Challenges in Telecommunications 2025” section 4, pp. 231-234. Retrieved from: https://conferenc.its.kpi.ua/2025
Zainb Asimiyu(2024), VoIP Security in Practice: Implementing Robust Defense Mechanisms for Safe Communication, pp. 1-19. Retrieved from: https://www.researchgate.net/publication/388614637_VoIP_Security_in_Practice_Implementing_Robust_Defense_Mechanisms_for_Safe_Communication
David Butcher, Xiangyang Li, and Jinhua Guo(2007), Security Challenge and Defense in VoIP Infrastructures, IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews) 37(6), pp. 1152 – 1162. Retrieved from: https://www.researchgate.net/publication/3421877_Security_Challenge_and_Defense_in_VoIP_Infrastructures
Perigo, L., Gandotra, R., Gedia, D., Hussain, M., & Others. (2020), VoIP security: A performance and cost-benefit analysis, Information Technology in Industry. Retrieved from: https://it-in-industry.org/index.php/itii
Ramly, A. M., Ng, Z. W., Khamayseh, Y., Kwa, C. S. C., & Neo, T. K. (2024), Review and enhancement of VoIP security: Identifying vulnerabilities and proposing integrated solutions, Journal of Telecommunications and the Digital Economy, 12(4), pp. 109-136. Retrieved from: https://jtde.telsoc.org/index.php/jtde
Dabbebi, O., & Festor, O. (2018). Advanced threat detection in Asterisk PBX systems, VoIP Systems Journal, 21(3), pp. 121-134.
Ramly, A. M., Ng, Z. W., & Khamayseh, Y. (2024). Review and enhancement of VoIP security: Identifying vulnerabilities and proposing integrated solutions, Digital Information and Security Journal, pp. 45-54. Retrieved from: https://search.informit.org/selectDatabases?redirectUri=
Jahanirad, M., Yahya, A. L. N., & Noor, R. M. (2011). Security measures for VoIP application: A state of the art review. Scientific Research and Essays, pp. 20-34. Retrieved from: https://academicjournals.org/
Melih Tas, Selcuk Baktir(2024), Blockchain-Based Caller-ID Authentication (BBCA): A Novel Solution to Prevent Spoofing Attacks in VoIP/SIP Networks, in IEEE Access, vol. 12, pp. 60123-60137. Retrieved from: https://ieeexplore.ieee.org/document/10508353
I. M. Tas, B. G. Unsalver, and S. Baktir(2020), A novel SIP based distributed reflection denial-of-service attack and an effective defense mechanism, IEEE Access, vol. 8, pp. 112574–112584. Retrieved from: https://ieeexplore.ieee.org/document/9114982
M. A. Ramírez-Reyna, F. A. Cruz-Pérez, S. Lirio Castellanos-López and G. Hernández-Valdez(2024), "Comparison of Analysis Methods for the Joint Connection-Level and Packet-Level Performance Evaluation of VoIP Traffic Networks," in IEEE Access, vol. 12, pp. 163349-163366. Retrieved from: https://ieeexplore.ieee.org/document/10742327
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
The ownership of copyright remains with the Authors.
Authors may use their own material in other publications provided that the Journal is acknowledged as the original place of publication and National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” as the Publisher.
ITS articles are published under Creative Commons licence:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under CC BY 4.0that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.