Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1143549.1143622acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
Article

Simple voice security protocol

Published: 03 July 2006 Publication History

Abstract

The public telephone network has been evolving from manually switching wires carrying analog encoded voice to an automatically switched grid of copper-wired, fiber optical and wireless mobile connectivity carrying digitally encoded voice, image and data. The evolution of the information technology yields to a converged data and voice network based on IP technology. VoIP emerged and it is taking a large part of the telephony market nowadays. However, the IP network presents security threats to both data and voice packets. To ensure a secure voice network, the security services and mechanisms are defined and the security protocols are created. But, the existing security solutions are related to each network infrastructure. Also, the existing public telephone network does not provide such a service. This paper describes the Simple Voice Security Protocol that provides a secure end-to-end voice communication with an abstraction of the underlying infrastructure.

References

[1]
S. Kent, R. Atkinson, "Security Architecture for the Internet Protocol", IETF RFC 2401 - Nov. 1998]]
[2]
General Dynamics, "FNBDT Signaling Plan, Revision 1.1", National Security Agency, 01 Sept.1999]]
[3]
M. Baugher, & al. "The Secure Real-time Transport Protocol", RFC 371, March 2004]]
[4]
Doug Rahikka, "3G Wireless Security - A Government Perspective", National Security Agency NSA-TRI23, ISART September 2000]]
[5]
T. Dierks, C. Allen, "The TLS Protocol Version 1.0", IETF RFC 2246, January 1999]]
[6]
ITU-T H.323 v4, "Packet-based multimedia communications systems", July 2003]]
[7]
ITU-T H.235 v3, "Security and encryption for H-Series multimedia terminals", August 2003]]
[8]
E. Rescorla, N. Modadugu, "Datagram Transport Layer Security", IETF nternet-draft-rescorla-dtls-05.txt, June 2004]]
[9]
R. Morrow, "Bluetooth: Operation and Use", McGraw-Hill Professional, 1st edition 2002]]
[10]
M. Handley, H. Schulzrinne, E. Schooler, J. Rosenberg, SIP: Session Initiation Protocol", RFC 2543 - March 1999]]
[11]
X. Lagrange, P. Godlewski, S. Tabbane, "Réseaux GSM", Hermes Sciences, 5th edition]]
[12]
W. Diffie, and M.E. Hellman, "New directions in cryptography", IEEE Transactions on Information Theory, 22, 6, p. 655--654 (1976)]]
[13]
RSA Laboratories, "RSA Encryption Standard", PKCS #1, November 1993]]
[14]
C.Bassil, N.Rouhana, A.Serhrouchni, "Towards securing VoIP communications with FNBDT", ICT 2005, May 2005. in press.]]
[15]
C.Bassil, N.Rouhana, A.Serhrouchni, "Critical analysis and new perspective for securing Voice Networks", ICN 2005, April 2005. in press]]
[16]
Department of Defense Security Institute, "STU-III Handbook for Industry", http://www.tscm.com/STUIIIhandbook.html, February 1997]]
[17]
M. Sharif, D. Wijesekera, J. Bret Michael, "Providing Secure Communication Services on the Public Telephone Network Infrastructures", in press]]
[18]
NIST, "Advanced Encryption Standard (AES)", FIPS PUB 1997, http://www.nist.gov/aes]]
[19]
K. Krawczyk, M. Bellare, R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", IETF RFC 2104, February 1997]]
[20]
R. Rivest, "The MD5 Message-Digest Algorithm", IETF RFC 1321, April 1992]]
[21]
NIST, FIPS PUB 180-1, "Secure Hash Standard", April 1995]]
[22]
H. Tschofenig, J. Peterson, J. Polk, M. Tegnander, "Using SAML for SIP", Internet draft : draft-tschofenig-sip-saml-04.txt, july 2005.]]
[23]
C. Bassil, et al, "State-of-the-art of the voice security", SAR 04, June 2004. in press.]]
[24]
C. Bassil, A. Serhrouchni, N. Rouhana, "Critical voice network security analysis and new approach for securing Voice over IP Communications", SETIT 05, March 2005. in press]]
[25]
Jain SIP, https://jain-sip.dev.java.net/]]

Cited By

View all
  • (2014)A new approach to authenticating and encrypting Voice over Internet Protocol communicationsSoftware—Practice & Experience10.1002/spe.217544:5(593-619)Online publication date: 1-May-2014
  • (2008)VoIProtectProceedings of the 2008 Tenth IEEE International Symposium on Multimedia10.1109/ISM.2008.60(412-417)Online publication date: 15-Dec-2008

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IWCMC '06: Proceedings of the 2006 international conference on Wireless communications and mobile computing
July 2006
2006 pages
ISBN:1595933069
DOI:10.1145/1143549
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 July 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. SVSP
  2. security mechanisms
  3. security services
  4. telephony

Qualifiers

  • Article

Conference

IWCMC06
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2014)A new approach to authenticating and encrypting Voice over Internet Protocol communicationsSoftware—Practice & Experience10.1002/spe.217544:5(593-619)Online publication date: 1-May-2014
  • (2008)VoIProtectProceedings of the 2008 Tenth IEEE International Symposium on Multimedia10.1109/ISM.2008.60(412-417)Online publication date: 15-Dec-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media