Secure Voice over Internet Protocol based on Combined Secret Key Method

被引:0
|
作者
Zhao, Gui-fen [1 ]
Du, Li-ping [1 ]
Li, Ying [1 ]
Xu, Guan-ning [1 ]
机构
[1] Beijing Municipal Inst Sci & Technol Informat, Dept Informat Technol Res, Beijing, Peoples R China
关键词
Secure voice over internet; combined secret key; encryption key; SIP; smart card;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For more secure voice communication over Internet, the secure voice over internet protocol is proposed. The key agreement and the cipher text of voice packets transmission processes are related to the SIP, SDP and UDP. Parameters are negotiated using the SDP during the calling process for connection and key agreement, which is transported in the SIP packet body. The voice data are encrypted in groups and transported to secure communication server using UDP. Secure communication server forwards the cipher text packets to the receiver. Each secure voice communication over internet owns a different session key generated randomly and a different encryption key generated on the basis of key seeds according to random numbers and time-stamp, which guarantees security over Internet for voice communication users.
引用
收藏
页码:186 / 190
页数:5
相关论文
共 50 条
  • [31] Secret Key Agreement Based on Secure Polar Code
    Zhang Shengjun
    Zhong Zhou
    Jin Liang
    Huang Kaizhi
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (06) : 1413 - 1419
  • [32] Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card
    Zhang, Liping
    Tang, Shanyu
    Cai, Zhihua
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 2691 - 2702
  • [33] A secure authentication protocol for healthcare service in IoT with Q-net based secret key generation
    Mahajan, Rupali
    Chavan, Smita
    Ajalkar, Deepika Amol
    Balshetwar, S., V
    Khadkikar, Prajakta Ajay
    WEB INTELLIGENCE, 2023, 21 (04) : 407 - 433
  • [34] Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation
    Jiang, Yijing
    Tang, Shanyu
    Zhang, Liping
    Xiong, Muzhou
    Yip, Yau Jim
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2016, 12 (04)
  • [35] Asterisk Open Source to Implement Voice over Internet Protocol
    Al-Saadoon, Ghossoon M. Waleed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (06): : 39 - 42
  • [36] Objective quality analysis of a Voice over Internet Protocol system
    Hooper, JB
    Russell, MJ
    ELECTRONICS LETTERS, 2000, 36 (22) : 1900 - 1901
  • [37] Voice over internet protocol with prepaid calling card solutions
    Gunadi, T
    VOICE OVER IP (VOIP) TECHNOLOGY, 2001, 4522 : 61 - 68
  • [38] Wireless applications using Internet Protocol and voice over IP
    Perini, PL
    2001 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-7, 2001, : 1043 - 1050
  • [39] An Analysis of Voice over Internet Protocol in Wireless Mesh Networks
    Meeran, Mohammad Tariq
    Tucker, William D.
    2014 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE), 2014,
  • [40] A secure key exchange protocol for Industrial Internet of Things based on tropical triad matrix semiring
    J. Jackson
    R. Perumal
    International Journal of Information Technology, 2025, 17 (1) : 293 - 300