A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes
نویسندگان
چکیده
Voice over IP (VoIP) service has been widely deployed over the prevalent Internet due to the advanced technologies of digital voice compression, communication protocols, and wired/wireless networks. VoIP then benefitmuch lower cost of equipment, operation, and better integrationwith data applications than voice communications over telephony networks. On the other hand, VoIP further introduce security vulnerability while delivering voice packets over the public Internet, using the transparent IP protocol suite. The most popular solution to secure VoIP voice packets is to apply cost-effective AES encryption with a single key during to a voice call. In this paper, to further enhance the VoIP security to prevent malicious eavesdroppers, we propose a much stronger privacy protection for an end-to-end VoIP. This dependable solution applies not only the Elliptic-Curve Diffie-Hellman (ECDH) algorithm for key negotiation, but also the key generation function (KGF) for changing key dynamically in a VoIP call session. This 2-tier key distribution scheme provides effective and robust security for VoIP voice packets during the end-to-end call session. This proposed scheme has been deployed on an opensource SIP-based phone as our test-bed over the Internet. The performance results from the experiments with the Internet dynamics of packet loss inserted on the test-bed demonstrate that the proposed scheme not only provide more secure VoIP call, but also preserve the quality of voice packet delivery. & 2010 Elsevier Ltd. All rights reserved.
منابع مشابه
Diffie-Hellman type key exchange protocols based on isogenies
In this paper, we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves. The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $, is a straightforward generalization of elliptic curve Diffie-Hellman key exchange. The method uses commutativity of the endomorphism ring $ End(E) $. Then using dual isogenies, we propose...
متن کاملA NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL
Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...
متن کاملEfficient modified elliptic curve diffie-hellman algorithm for VoIP networks
Security in Voice over Internet Protocol (VoIP) network has turned to be the most challenging issue in recent years. VoIP packets are easy to eavesdrop on by hackers due to the use of Diffie-Hellman (DH) algorithm for single common key exchange between two end-users. As a result the confidentiality of voice data turns to be a challenging issue. There is a need for strong key management algorith...
متن کاملBLIND: A Complete Identity Protection Framework for End-points
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authenticated Diffie-Hellman key exchange protocol that identifies the end-points to each other and creates a security association between the peers. The protocol hides the public key based identifiers from attackers and e...
متن کاملBLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion)
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authenticated Diffie-Hellman key exchange protocol that identifies the end-points to each other and creates a security association between the peers. The protocol hides the public key based identifiers from attackers and e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Network and Computer Applications
دوره 34 شماره
صفحات -
تاریخ انتشار 2011