A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes

نویسندگان

  • Chia-Hui Wang
  • Yu-Shun Liu
چکیده

Voice over IP (VoIP) service has been widely deployed over the prevalent Internet due to the advanced technologies of digital voice compression, communication protocols, and wired/wireless networks. VoIP then benefitmuch lower cost of equipment, operation, and better integrationwith data applications than voice communications over telephony networks. On the other hand, VoIP further introduce security vulnerability while delivering voice packets over the public Internet, using the transparent IP protocol suite. The most popular solution to secure VoIP voice packets is to apply cost-effective AES encryption with a single key during to a voice call. In this paper, to further enhance the VoIP security to prevent malicious eavesdroppers, we propose a much stronger privacy protection for an end-to-end VoIP. This dependable solution applies not only the Elliptic-Curve Diffie-Hellman (ECDH) algorithm for key negotiation, but also the key generation function (KGF) for changing key dynamically in a VoIP call session. This 2-tier key distribution scheme provides effective and robust security for VoIP voice packets during the end-to-end call session. This proposed scheme has been deployed on an opensource SIP-based phone as our test-bed over the Internet. The performance results from the experiments with the Internet dynamics of packet loss inserted on the test-bed demonstrate that the proposed scheme not only provide more secure VoIP call, but also preserve the quality of voice packet delivery. & 2010 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Diffie-Hellman type key exchange protocols based on isogenies

‎In this paper‎, ‎we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves‎. ‎The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $‎, ‎is a straightforward generalization of elliptic curve Diffie-Hellman key exchange‎. ‎The method uses commutativity of the endomorphism ring $ End(E) $‎. ‎Then using dual isogenies‎, ‎we propose...

متن کامل

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

Efficient modified elliptic curve diffie-hellman algorithm for VoIP networks

Security in Voice over Internet Protocol (VoIP) network has turned to be the most challenging issue in recent years. VoIP packets are easy to eavesdrop on by hackers due to the use of Diffie-Hellman (DH) algorithm for single common key exchange between two end-users. As a result the confidentiality of voice data turns to be a challenging issue. There is a need for strong key management algorith...

متن کامل

BLIND: A Complete Identity Protection Framework for End-points

In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authenticated Diffie-Hellman key exchange protocol that identifies the end-points to each other and creates a security association between the peers. The protocol hides the public key based identifiers from attackers and e...

متن کامل

BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion)

In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authenticated Diffie-Hellman key exchange protocol that identifies the end-points to each other and creates a security association between the peers. The protocol hides the public key based identifiers from attackers and e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Network and Computer Applications

دوره 34  شماره 

صفحات  -

تاریخ انتشار 2011