Secure Voice over Internet Protocol based on Combined Secret Key Method

被引:0
|
作者
Zhao, Gui-fen [1 ]
Du, Li-ping [1 ]
Li, Ying [1 ]
Xu, Guan-ning [1 ]
机构
[1] Beijing Municipal Inst Sci & Technol Informat, Dept Informat Technol Res, Beijing, Peoples R China
关键词
Secure voice over internet; combined secret key; encryption key; SIP; smart card;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For more secure voice communication over Internet, the secure voice over internet protocol is proposed. The key agreement and the cipher text of voice packets transmission processes are related to the SIP, SDP and UDP. Parameters are negotiated using the SDP during the calling process for connection and key agreement, which is transported in the SIP packet body. The voice data are encrypted in groups and transported to secure communication server using UDP. Secure communication server forwards the cipher text packets to the receiver. Each secure voice communication over internet owns a different session key generated randomly and a different encryption key generated on the basis of key seeds according to random numbers and time-stamp, which guarantees security over Internet for voice communication users.
引用
收藏
页码:186 / 190
页数:5
相关论文
共 50 条
  • [1] Secure Voice Over Internet Protocol(VoIP) Network with Biometric Key
    Bhuvaneshwari, S.
    Arul, P.
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 1431 - 1435
  • [2] Dynamic Key Updating With Voice Quality Preserving for Voice over Internet Protocol Based on Steganography
    Zhang, Li-Ping
    Tang, Shan-Yu
    Jiang, Yi-Jing
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 500 - 503
  • [3] Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication
    Krasnowski, Piotr
    Lebrun, Jerome
    Martin, Bruno
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 683 - 690
  • [4] Secure Key Transfer Protocol Based on Secret Sharing for Group Communications
    Lee, Chia-Yin
    Wang, Zhi-Hui
    Harn, Lein
    Chang, Chin-Chen
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2069 - 2076
  • [5] VoIP (Voice over Internet protocol)
    Davies, D
    CANADIAN MINING JOURNAL, 2005, 126 (06) : 9 - 9
  • [6] Securing Voice over Internet Protocol
    Ghafarian, Ahmad
    Draughorne, Randolph
    Hargraves, Shelley
    Grainger, Steven
    High, Stacy
    Jackson, Crystal
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (03): : 200 - 204
  • [7] VoIP (Voice over Internet Protocol)
    Davies, Dan
    Canadian Mining Journal, 2005, 126 (06):
  • [8] Voice over Internet protocol (VoIP)
    Goode, B
    PROCEEDINGS OF THE IEEE, 2002, 90 (09) : 1495 - 1517
  • [9] VoIP (Voice over Internet Protocol)
    Davies, D
    PULP & PAPER-CANADA, 2005, 106 (05) : 15 - 15
  • [10] Packet based echo cancellation for voice over Internet protocol
    Periakarruppan, G
    Rashid, HAB
    2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 390 - 393