CFP last date
20 January 2025
Reseach Article

Privacy and Packet Dispersion of Voice Applications in P2P Networks-VoIP

by A. Thamizharasi, M. Vanitha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 43 - Number 12
Year of Publication: 2012
Authors: A. Thamizharasi, M. Vanitha
10.5120/6154-8546

A. Thamizharasi, M. Vanitha . Privacy and Packet Dispersion of Voice Applications in P2P Networks-VoIP. International Journal of Computer Applications. 43, 12 ( April 2012), 12-15. DOI=10.5120/6154-8546

@article{ 10.5120/6154-8546,
author = { A. Thamizharasi, M. Vanitha },
title = { Privacy and Packet Dispersion of Voice Applications in P2P Networks-VoIP },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 43 },
number = { 12 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume43/number12/6154-8546/ },
doi = { 10.5120/6154-8546 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:33:12.231634+05:30
%A A. Thamizharasi
%A M. Vanitha
%T Privacy and Packet Dispersion of Voice Applications in P2P Networks-VoIP
%J International Journal of Computer Applications
%@ 0975-8887
%V 43
%N 12
%P 12-15
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we are mainly focusing about how to improve privacy in peer to peer VOIP network without the involvement of third party. Currently we have the technologies like skype, Gtalk through which we can communicate all over the world through internet. In this technologies the voice from source to destination will be transformed through the third party server to the destination so here we can't expect privacy from that we came to the conclusion that there is a need for privacy so we are creating the personal network which connects many system through the LAN or wifi and allows users to communicate directly without any third party server in between.

References
  1. P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an analysis of onion routing security. In workshop on design issues in anonymity and unobservability,2000.
  2. R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second generation onion router. In 13th USENIX security symposium,2000.
  3. G. Perng, M. K. Reiter, and C. Wang. M2: Multicasting mixes for efficient and anonymous communication. In IEEE ICDCS,2006.
  4. A. Back, I. Goldberg, and A. Shostack. Freedom 2. 1 security issues and analysis. Zero Knowledge Systems, Inc. white paper, 2001.
  5. Mudhakar Srivatsa, Arun Iyengar, Ling Liu and Hongbo Jiang. Privacy in VoIP Networks:Flow Analysis Attacks and Defense,2009
  6. S. Saroiu,P. K. Gummadi, and S. D. Gribble. A Measurement Study of peer-to-peer file sharing systems In Multimedia computing and networks(MMCA),2002.
  7. E. W. Zegura, K. Calvert, and S. Bhattacharjee. How to model an internetwork? In IEEE Infocom, 1996.
  8. GT-ITM: Georgia tech internetwork topology models. http://www. cc. gatech. edu/projects/gtitm/.
  9. The c sharp network programming. http://www. isi. edu.
  10. C# Network Programming book by Richard Blum.
  11. B. Fortz and M. Thorup. Optimizing OSPF/IS-IS weights in a changing world. In IEEE Journal on Special Areas in Communication, 2002.
  12. L. Qiu, V. N. Padmanabhan, and G. M. Voelker. On the placement of web server replicas. In 12th IEEE INFOCOM, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Voip-voice Over Internet Protocol Pstn (public Switched Telephone Network) P2p(peer To Peer) lan(local Area Network) gtalk(google Talk) des(data Encryption Standard)