Information leakage in ubiquitous Voice-over-IP communications

  • Authors:
  • Thorsten Neumann;Heiko Tillwick;Martin S. Olivier

  • Affiliations:
  • Information and Computer Security Architectures (ICSA) Research Group, Department of Computer Science, University of Pretoria, South Africa;Information and Computer Security Architectures (ICSA) Research Group, Department of Computer Science, University of Pretoria, South Africa;Information and Computer Security Architectures (ICSA) Research Group, Department of Computer Science, University of Pretoria, South Africa

  • Venue:
  • TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
  • Year:
  • 2006
  • Voice over IP forensics

    Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop

Quantified Score

Hi-index 0.00

Visualization

Abstract

In VoIP, proxies are used by end-devices to perform a number of tasks including call setup and routing. Setup and routing is achieved through the exchange of call control messages which are forwarded among all involved proxies as well as the communicating end-devices. This paper will explore the information exchanged in Voice-over-IP (VoIP) call control messages and any possible implications this has on personal privacy. We assess the explicit and implicit deductions that can be made from handling messages in transit and evaluate these with a conceptual anonymity model. We aim to show that profiling is a threat in current VoIP implementations and that this threat becomes increasingly relevant with the growing adoption of VoIP. We consider these facts in light of possible future scenarios whereby VoIP has the potential to become a truly ubiquitous technology.