New Novel Approaches for Securing VoIP Applications
نویسندگان
چکیده
SIP message authentication and SRTP key agreement are the important issue in the SIP-based VoIP service. Several secure solutions such as HTTP Digest Authentication, SSL/TLS, and S/MIME, are used for the SIP message authentication and key agreement. When the VoIP is used in the wireless environments, the efficiency of security service is one of the important matters in question. For the such efficiency, WPKI is a better substitution than the traditional PKI, while it still requires the effort on the certificate management. Therefore, we would like to propose efficient ID-based cryptosystem for the VoIP in the wireless environments. In this paper, we present the overview of WPKI and the application of ID-based cryptosystem for the SIP message authentication as well as the authenticated one-way key agreement for SRTP. Our novel design reduces delaying for the key generation and provides the explicit mutual authentication.
منابع مشابه
Securing VOIP networks via Transport protocols Layer
Voice over Internet Protocol (VoIP), is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line. VoIP services have compelling technical advantages over circuit switching. VoIP networks are based more on an open architecture than that of their circuit-switched contemporaries. This open, standards-based architecture means...
متن کاملSecuring the Media Stream Inside VoIP SIP Based Sessions
One of the main issues encountered in the development of VoIP applications and infrastructures relates with ensuring the security of the communication channel between peers. The discussion on this subject can be split in two principal directions: the signaling path security and the media path security. In this document we focus on the latter by overviewing the current most important available m...
متن کاملNew Methods for Voice Quality Evaluation for IP Networks
The need to evaluate voice quality in VoIP (Voice over IP) applications is an important requirement for technical and commercial reasons. This may involve subjective and/or objective voice quality measurements, but existing methods may not always be appropriate for VoIP applications. The aims of the study reported in the paper are to investigate new subjective and objective measurement methods ...
متن کاملSecuring Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کاملRisk management of VoIP implementation
Corporate governance is generally regarded as the means by which an organization should be directed and controlled. According to good corporate governance practices, an organization should maintain a competitive advantage by securing its assets and protecting against new threats introduced through new technologies. An example of a new technology that is being increasingly implemented in organiz...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007