Security and Non-Repudiation for Voice-Over-IP Conversations

نویسندگان

  • Christian Hett
  • Nicolai Kuntze
  • Andreas U. Schmidt
چکیده

This thesis presents a concept to achieve non-repudiation for natural language conversations by electronically signing continuous, packet-based, digital voice communication (VoIP). Signing a VoIP-based conversation means to protect the integrity and authenticity of the bidirectional data stream and its temporal sequence which together establish the security context of the communication. The solution is based on chains of hashes and continuously chained electronic signatures. The protection is provided continuously during the ongoing conversations, they are not processed at once like traditional digital documents which could be trivially signed. A possible implementation and necessary protocols are described to apply these concepts to SIP/RTP-based VoIP-communication. This provides a high level of inherent security and enables PKI-based non-reputable signatures over voice as true declarations of will, without additional witnesses and in principle between unacquainted speakers. As a demonstrator for these concepts, an efficient VoIP-archive securing the integrity of SIP-based two-party conversations was implemented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Critical voice network security analysis and new approach for securing Voice over IP Communications

Voice networks evolved from the fixed traditional telephone system, to mobile and wireless networks and now towards a converged voice and data infrastructure. This convergence is based on the spread of the Internet Protocol, where VoIP is developing. Due to IP network characteristics, hackers are able to compromise and take control of different aspects of IP telephony such as signaling informat...

متن کامل

Non-Repudiation in Internet Telephony

We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication. It establishes the integrity and authenticity of the bidirectional data stream and its temporal sequence and thus the security context of a conversation. The concept is close to th...

متن کامل

Performance Analysis of Virtual Private Network for Securing Voice and Video Traffic

Security and privacy become mandatory requirements for voice and video communications that needs security services such as confidentiality, integrity, authentication, non-replay and non repudiation. Stringent quality of service (QOS) maintenance for voice & video communication is a major challenge. New security solutions must take into account the real-time constraint of voice & video and their...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/cs/0606068  شماره 

صفحات  -

تاریخ انتشار 2006