Network security performance analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger / Nur Khairani Kamarudin ... [et al.]

Kamarudin, Nur Khairani and Bismi, Nur Syafiqa and Ahmad Zukri, Nurul Hidayah and Mohd Fuzi, Mohd Faris and Ramle, Rashidah (2020) Network security performance analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger / Nur Khairani Kamarudin ... [et al.]. Journal of Computing Research and Innovation (JCRINN), 5 (2). pp. 21-27. ISSN 2600-8793

Download

[thumbnail of 43513.pdf] Text
43513.pdf

Download (213kB)

Abstract

VoIP application usage has increased from time to time and makes our daily life more convenient. VoIP application has features to make a phone call, send a text message and share the file through the apps for free. However, most of the users did not seem aware of VoIP security features such as authentication ability, password encryption ability, or voice or audio and text communication encryption ability. It is essential to ensure the VoIP used is secure from password decrypter and eavesdrops the user conversation. Thus, the first objective of this research was to study and investigate VoIP application consist of Kakao Talk, Telegram, Facebook Messenger and WhatsApp for both Android and web
application. The second objective was to evaluate the four VoIP application identified based on authentication requirement, password encryption, voice or audio encryption communication, and text encryption communication. There were two mobile phones used. One acts as a client and a personal computer act as an attacker. Wireshark and packet capture were run in personal computer and mobile
phone to monitoring and scanning the network traffic while both devices connected in the same WLAN. The experiment implements MITM, interception, and sniffing attacks. This research project has identified Facebook Messenger and WhatsApp web application do not provide secure password ability.

Metadata

Item Type: Article
Creators:
Creators
Email
Kamarudin, Nur Khairani
UNSPECIFIED
Bismi, Nur Syafiqa
UNSPECIFIED
Ahmad Zukri, Nurul Hidayah
UNSPECIFIED
Mohd Fuzi, Mohd Faris
UNSPECIFIED
Ramle, Rashidah
UNSPECIFIED
Subjects: Q Science > QA Mathematics > Instruments and machines > Electronic Computers. Computer Science > Mobile computing
T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > Computer networks. General works. Traffic monitoring > Intrusion detection systems (Computer security). Computer network security. Hackers
Divisions: Universiti Teknologi MARA, Perlis > Arau Campus > Faculty of Computer and Mathematical Sciences
Journal or Publication Title: Journal of Computing Research and Innovation (JCRINN)
UiTM Journal Collections: UiTM Journal > Journal of Computing Research and Innovation (JCRINN)
ISSN: 2600-8793
Volume: 5
Number: 2
Page Range: pp. 21-27
Official URL: https://crinn.conferencehunter.com/
Item ID: 43513
Related URLs:
Uncontrolled Keywords: VoIP application, authentication, password, encryption
URI: https://ir.uitm.edu.my/id/eprint/43513

ID Number

43513

Indexing


View in Google Scholar

Edit Item
Edit Item