Challenges in Securing Voice over IP
IEEE Security and Privacy
Evaluating the Security of Enterprise VoIP Networks
IT Professional
Voice-over-IP Security: Research and Practice
IEEE Security and Privacy
Security Challenge and Defense in VoIP Infrastructures
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
An overview of public key cryptography
IEEE Communications Magazine - Part Anniversary
The IETF Internet telephony architecture and protocols
IEEE Network: The Magazine of Global Internetworking
Elliptic curve cryptography: survey and its security applications
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
Multipoint-to-point communications for SHE surveillance with QoS and QoE management
Engineering Applications of Artificial Intelligence
Journal of Network and Computer Applications
Review: VoIP: State of art for global connectivity-A critical review
Journal of Network and Computer Applications
Hi-index | 0.00 |
Voice over IP (VoIP) service has been widely deployed over the prevalent Internet due to the advanced technologies of digital voice compression, communication protocols, and wired/wireless networks. VoIP then benefit much lower cost of equipment, operation, and better integration with data applications than voice communications over telephony networks. On the other hand, VoIP further introduce security vulnerability while delivering voice packets over the public Internet, using the transparent IP protocol suite. The most popular solution to secure VoIP voice packets is to apply cost-effective AES encryption with a single key during to a voice call. In this paper, to further enhance the VoIP security to prevent malicious eavesdroppers, we propose a much stronger privacy protection for an end-to-end VoIP. This dependable solution applies not only the Elliptic-Curve Diffie-Hellman (ECDH) algorithm for key negotiation, but also the key generation function (KGF) for changing key dynamically in a VoIP call session. This 2-tier key distribution scheme provides effective and robust security for VoIP voice packets during the end-to-end call session. This proposed scheme has been deployed on an opensource SIP-based phone as our test-bed over the Internet. The performance results from the experiments with the Internet dynamics of packet loss inserted on the test-bed demonstrate that the proposed scheme not only provide more secure VoIP call, but also preserve the quality of voice packet delivery.