While standards, open-source and commercial products now support PSTN-equivalent services for voice, video and text over IP, significant difficulties remain in deploying such IP-based telecommunication services on a large-scale, reliably and securely. Services that go beyond basic call features remain hard to develop and deploy.
With this in mind, a group of researchers working in these area started IPTComm this year, with the goal to cover two of the most urgent challenges faced by providers of IP-based telecommunication services, namely how to secure their infrastructure and how to efficiently create new services. While a new event, IPTComm builds on the earlier workshops on VoIP and VoIP security.
With the increased popularity of IP-based telecommunication services, it has become of utmost importance to service providers to ensure the availability of their services under all circumstances and to reduce the possibilities of fraud. In the security-related sessions at IPTComm, various threats are discussed and innovative approaches and tools for detecting attacks are presented.
To extend the scope of IP-based telecommunication services and achieve new streams of revenue, service providers need efficient as well as powerful and simple-to-use tools for creating new services and integrating them into their current infrastructure. Such tools are presented in the service creation-oriented sessions in which also a number of innovative approaches for service creation and specification are discussed. Further, intelligent deployment service architectures such as peer-to-peer-based architectures or presence-based conferencing system are provided as well.
With these topics, IPTComm is covering a gap that concerns service providers and that has yet to be addressed by the typical VoIP standardization bodies.
With its demonstrations track, industry panel and keynote speeches by two distinguished veterans of the IP-based telecommunication industry, Jeff Pulver and Jonathan Rosenberg, IPTComm is also highlighting the important aspect of translating research into deployments.
VoIP security is crucial for current and future networks and services. The rapid shift from a closed and confined telephony towards an all IP network supporting end to end VoIP services provides major challenges to the security plane. Faced with ...
VoIP services are becoming increasingly a big competition to existing telephony services (POTS / ISDN). The increasing number of customers using VoIP makes VoIP services a valuable target for attackers that want to bring down the service, take it over ...
In this article we present a thorough performance analysis of an actual implementation of a distributed conferencing framework compliant with the IP multimedia core network subsystem specification. The subject of our experimental campaign has been an ...
Voice over IP (VoIP) has been a promising technology for several years. Although it has become very popular, the vision to substitute the "good old" Public Switched Telephone Network (PSTN) is still far from being true. Several issues, such as security, ...
Services provided by non-IMS enabled platforms (e.g. home electronics, entertainment systems, and various home appliances) are typically not accessible to remote users such as IMS subscribers in spite of the ubiquity of modern mobile communications. ...
With the recent evolution in the VoIP market, where more and more devices and services are being pushed on a very promising market, assuring their security becomes crucial. Among the most dangerous threats to VoIP, failures and bugs in the software ...
A simple yet effective Denial of Service (DoS) attack on SIP servers is to flood the server with requests addressed at irresolvable domain names. In this paper we evaluate different possibilities to mitigate these effects and show that over-provisioning ...
In telecommunications, audio signaling is the use of the audio channel for signaling and user-interface purposes. When features use audio signaling, and are assembled in a pipes-and-filters configuration, there is a potential for undesirable feature ...
Developing a SIP-based telephony service requires a programmer to have expertise in telephony rules and constraints, the SIP protocol, distributed systems, and a SIP API, which is often large and complex. These requirements make the development of ...
The development of telecommunication applications that require multiple call legs is often complex due to their event-driven nature as well as the significant amount of state that must be maintained. In general, the state associated with different call ...
The open-endedness of telephony platforms is creating expectations among users, ranging from end-users to administrators, to create services dedicated to their activities. Not only is the population of developers heterogeneous, but the technologies ...
| Year | Submitted | Accepted | Rate |
|---|---|---|---|
| IPTComm '13 | 12 | 6 | 50% |
| IPTComm '10 | 50 | 12 | 24% |
| Overall | 62 | 18 | 29% |