Secure Voice over Internet Protocol based on Combined Secret Key Method

被引:0
|
作者
Zhao, Gui-fen [1 ]
Du, Li-ping [1 ]
Li, Ying [1 ]
Xu, Guan-ning [1 ]
机构
[1] Beijing Municipal Inst Sci & Technol Informat, Dept Informat Technol Res, Beijing, Peoples R China
关键词
Secure voice over internet; combined secret key; encryption key; SIP; smart card;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For more secure voice communication over Internet, the secure voice over internet protocol is proposed. The key agreement and the cipher text of voice packets transmission processes are related to the SIP, SDP and UDP. Parameters are negotiated using the SDP during the calling process for connection and key agreement, which is transported in the SIP packet body. The voice data are encrypted in groups and transported to secure communication server using UDP. Secure communication server forwards the cipher text packets to the receiver. Each secure voice communication over internet owns a different session key generated randomly and a different encryption key generated on the basis of key seeds according to random numbers and time-stamp, which guarantees security over Internet for voice communication users.
引用
收藏
页码:186 / 190
页数:5
相关论文
共 50 条
  • [41] A secure authentication protocol for Internet applications over CATV network
    Chin, LP
    MULITMEDIA NETWORKS: SECURITY, DISPLAYS, TERMINALS, AND GATEWAYS, 1998, 3228 : 292 - 296
  • [42] A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles
    Wang, Jing
    Wu, Libing
    Wang, Huaqun
    Choo, Kim-Kwang Raymond
    Wang, Lianhai
    He, Debiao
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (23) : 24398 - 24416
  • [43] Secure and lightweight key agreement protocol for remote surgery over tactile internet using physically unclonable functions
    Lee, Tian-Fu
    Huang, Wei-Jie
    Chang, I. -Pin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (06) : 4247 - 4263
  • [44] Improving quality of service for internet protocol television and voice over internet protocol over long-term evolution networks
    Samrah, Ahmed Shaban
    Khalil, Abeer Twakol
    Ibrahim, Hegazi M.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2019, 22 (04) : 409 - 446
  • [45] Advantage of the Key Relay Protocol Over Secure Network Coding
    Kato, Go
    Fujiwara, Mikio
    Tsurumaru, Toyohiro
    IEEE TRANSACTIONS ON QUANTUM ENGINEERING, 2023, 4 : 1 - 17
  • [46] Secret Key Transmission Based on Channel Reciprocity for Secure IoT
    Choi, Jinho
    Ha, Jeongseok
    2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2016, : 388 - 392
  • [47] A Secret Key Updating Method between Devices for Secure Smart Services
    Han, Jin-Hee
    Kim, Geonwoo
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 946 - 948
  • [48] A New Method to Improve Voice over IP (VoIP) Bandwidth Utilization over Internet Telephony Transport Protocol (ITTP)
    Abualhaj, Mosleh M.
    Al-Tahrawi, Mayy M.
    Al-Khatib, Sumaya N.
    PROCEEDINGS OF 2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND INFORMATION ENGINEERING (ICSIE 2019), 2019, : 192 - 195
  • [49] Secure Authentication and Key Agreement Protocol for Tactile Internet-based Tele-Surgery Ecosystem
    Kaur, Kuljeet
    Garg, Sahil
    Kaddoum, Georges
    Guizani, Mohsen
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [50] A secure routing protocol based on RPL for Internet of Things
    Glissa, Ghada
    Rachedi, Abderrezak
    Meddeb, Aref
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,