Energy-Efficient Security for Voice over IP

نویسندگان

  • Hoseb Dermanilian
  • Farah Saab
  • Imad H. Elhajj
  • Ayman I. Kayssi
  • Ali Chehab
چکیده

The fast spread of handheld smart devices contributed to the development of VoIP softphones running over such devices. Most security mechanisms were mainly designed for desktop PCs and hence did not take into consideration the power constraints of handheld devices. This fact highly motivated the development of new security mechanisms that try to minimize the energy consumption without compromising the security of the exchanged data. In this paper, we propose an energy-efficient security algorithm for VoIP applications running on mobile devices (SecVoIP). The algorithm resolves several weaknesses available in current algorithms while maintaining an appropriate security level. Several experiments were conducted and the results showed significant improvement in processing time, CPU cycles, and consumed energy as compared to SRTP, one of the most widely used security protocols for VoIP. Moreover, we present the results of extensive experimental work that demonstrates that known plaintext attacks against audio streams are not feasible.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Critical voice network security analysis and new approach for securing Voice over IP Communications

Voice networks evolved from the fixed traditional telephone system, to mobile and wireless networks and now towards a converged voice and data infrastructure. This convergence is based on the spread of the Internet Protocol, where VoIP is developing. Due to IP network characteristics, hackers are able to compromise and take control of different aspects of IP telephony such as signaling informat...

متن کامل

Secure Communication Using Electronic Identity Cards for Voice over IP Communication, Home Energy Management, and eMobility

Using communication services is a common part of everyday life in a personal or business context. Communication services include Internet services like voice services, chat service, and web 2.0 technologies (wikis, blogs, etc), but other usage areas like home energy management and eMobility are will be increasingly tackled. Such communication services typically authenticate participants. For th...

متن کامل

Securing Voice over Internet Protocol ( Ip ) Networks

Voice over IP (VOIP) the transmis­ sion of voice over traditional packetswitched IP networks is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and security challenges. Lower cost and greater flexibility are among the prom­ ises of VOIP for the enterprise, but security administrators will face signif­ icant issues. Administrators m...

متن کامل

Voice Over IP - Security and SPIT

Voice-over-IP (VoIP) has become an attractive alternative to the plain old telephone system, especially due to the much lower communication costs. However, there are several threats. In this document, several such threats are discussed. Moreover, we ask whether these systems could be used in environments with very high security demands as they for example exist in the Swiss army. ∗Computer Syst...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2015