CFP last date
20 January 2025
Reseach Article

End to End Encryption Architecture for Voice over Internet Protocol

by Kaustubh Lohiya, Narendra Shekokar, Satish R. Devane
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 14
Year of Publication: 2012
Authors: Kaustubh Lohiya, Narendra Shekokar, Satish R. Devane
10.5120/5610-7878

Kaustubh Lohiya, Narendra Shekokar, Satish R. Devane . End to End Encryption Architecture for Voice over Internet Protocol. International Journal of Computer Applications. 41, 14 ( March 2012), 31-34. DOI=10.5120/5610-7878

@article{ 10.5120/5610-7878,
author = { Kaustubh Lohiya, Narendra Shekokar, Satish R. Devane },
title = { End to End Encryption Architecture for Voice over Internet Protocol },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 14 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 31-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number14/5610-7878/ },
doi = { 10.5120/5610-7878 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:29:36.113171+05:30
%A Kaustubh Lohiya
%A Narendra Shekokar
%A Satish R. Devane
%T End to End Encryption Architecture for Voice over Internet Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 14
%P 31-34
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Session Initiation Protocol (SIP) is an open standard protocol and constitutes the provisioning of services like Internet Telephony and Instant Messaging. Vulnerabilities in SIP have made it possible to exploit it and launch many of the known internet attacks and also few specific attacks, thus affecting the services deploying SIP for session management. To maintain the confidentiality and integrity of voice data security mechanisms need to be deployed. Currently available security measures do not take into account real time nature of data and are generic i. e. not optimized for VoIP technology. This paper presents new end to end encryption architecture for securing the VoIP calls which use SIP to establish their session taking into account the real time nature of data.

References
  1. H. Abdelmr, R. State, I. Chrisment, C. Popi, "Assessing the security of VoIP Services" IEEE 2007 paper 1-4244-0799-0/07.
  2. Liancheng Shan and Ning Jiang, "Research on Security Mechanisms of SIP-based VoIP System" IEEE 2009 paper 978-0-7695-3745-0/09.
  3. Valentina Casola, Massimiliano Rak, Antonino Mazzeo, Nicola Mazzoccca, "Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach" in ITCC 2005, paper 0-7695-2315-3/05
  4. Moses Garuba, Jiang Li and Zhenqiang Yi, "Security in the Era of Telecommunication: Threats, Risks and Control of VoIP" IEEE 2008, paper 978-0-7695-3099-4/08.
  5. Dimitris Geneiatakis, Tasos Dagiuklas, Georgios Kambourakis, Costas Lambrinoudakis, Stefanos Gritzalis, "Survey of Security Vulnerabilites in Session Initiation Protocol" IEEE Communication Surveys, Volume 8, No. 3, pp 1553-877X , 2006.
  6. Housam Al-Allouni1 Alaa Eldin Rohiem Mohammed Hashem Ali El-moghazy Abd El Aziz Ahmed "VoIP Denial of Service Attacks Classification and Implementation" in NRSC 2009, paper C14-1.
  7. Wafaa Bou Diab, Samir Tohme, carole Bassil, "VPN Analysis and New Perspective for Securing Voice over VPN Networks" in Networking and Services IEEE conference 2008, paper 0-7695-3094-X/08.
  8. David Butcher, Xiangyang Li, Jinhua Guo, "Security Challenge and Defense in VoIP Infrastructures" IEEE Transaction on System, Man and Cybernetics-Part C, Volume 37, No 6, pp 1094-6977, 2007
  9. Arno Wacker, Mirko Knoll, Timo Heiber and Kurt Rothermel, "A new Approach for establishing Pairwise keys for Securing Wireless Networks" in SenSys internal Conference 2005, paper 1-59593-054-X/05/0011
  10. Alex C, Snoeren and Hari Balakrishnan, "An End-to-End Approach to Host Mobility" in IEEE International Conference MobiCom 2000, paper 2000-08/2000.
  11. Chan Yeob Yeun, Salman Mohammed Al-Marzouqi, "Practical Implementations for Securing VoIP Enabled Mobile Devices" in Third IEEE international conference on Network and System Security 2009, paper 978-0-7695-3838-9/09.
  12. Behrouz A. Forouzan, Cryptography and Network Securit, Special Indian Edition, 2007.
  13. SIP: Session Initiation Protocol, IETF RFC 3261, 2002.
  14. Digest Access Authentication, IETF RFC 2069, 1997.
  15. Prateek Gupta, Vitaly Shmatikov, "Security Analysis of Voice-over-IP Protocols" in conference, paper 0-7695-2819-8/07.
Index Terms

Computer Science
Information Sciences

Keywords

Sip Vulnerability Encryption Algorithm Voip Exploitation Voip Communication