Qphone: A Quantum Security VoIP Phone

被引:8
|
作者
Liu, Bo [1 ]
Zhao, Baokang [1 ]
Wei, Ziling [1 ]
Wu, Chunqing [1 ]
Su, Jinshu [1 ]
Yu, Wanrong [1 ]
Wang, Fei [1 ]
Sun, Shihai [2 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha, Hunan, Peoples R China
[2] Natl Univ Def Technol, Dept Phys, Changsha, Hunan, Peoples R China
关键词
Measurement; Design; Experimentation; Security; Quantum Communication; VoIP; steganography; security;
D O I
10.1145/2534169.2491696
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a novel quantum security VoIP phone, called Qphone. Qphone integrates quantum key distribution (QKD) and VoIP steganography, and achieves peer-to-peer communication with information-theoretical security (ITS) guaranteeing. Qphone consists of three parts, a real-time QKD system, RT-QKD, a steganography software, VS-Phone, and an audio encryption and authentication hardware, AE-KEY. RT-QKD explores QKD technologies, and is able establish a shared key between two peers ensuring ITS. VS-Phone utilizes VoIP steganography to protect transmission channels of sensitive information. Qphone can provide efficient and real-time security protections to meet different security demands.
引用
收藏
页码:477 / 478
页数:2
相关论文
共 50 条
  • [21] Overview of security issues of voip
    Zandi, Marjan
    Martin, Miguel Vargas
    Hung, Patrick C. K.
    PROCEEDINGS OF THE IASTED EUROPEAN CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2007, : 254 - +
  • [22] VoIP Security - Attacks and Solutions
    Phithakkitnukoon, Santi
    Dantu, Ram
    Baatarjav, Enkh-Amgalan
    INFORMATION SECURITY JOURNAL, 2008, 17 (03): : 114 - 123
  • [23] A Security Model for VoIP Steganography
    Yu, Zhiwei
    Thomborson, Clark
    Wang, Chaokun
    Fu, Junning
    Wang, Jianmin
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 35 - +
  • [24] SECURITY ISSUES IN VOIP SYSTEMS
    Tarasinca, Camelia Mariana
    INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2012, : 119 - 122
  • [25] Carrier VoIP security architecture
    Marshall, William
    Faryar, Alireza Farid
    Kealy, Kevin
    de los Reyes, Gustav
    Rosencrantz, Israel
    Rosencrantz, Rachel
    Spielman, Chaim
    Networks 2006, 12th International Telecommunications Network Strategy and Planning Symposium, 2006, : 184 - 189
  • [26] Research on Security of VoIP Network
    Liu, Xiaojun
    Tu, Chunxia
    INNOVATIVE COMPUTING AND INFORMATION, ICCIC 2011, PT I, 2011, 231 : 59 - 65
  • [27] Alliance addresses VoIP security
    Alfonsi, E
    IEEE SECURITY & PRIVACY, 2005, 3 (04) : 8 - 8
  • [28] The security challenges inherent in VoIP
    Bradbury, D.
    COMPUTERS & SECURITY, 2007, 26 (7-8) : 485 - 487
  • [29] Research and Design of IP Phone Based on VoIP Technology
    YuanZhanting ZhangQiuyu SunWeiCollege of Electrical and Information EngineeringGansu Univof TechLanzhouChina
    微计算机信息, 2003, (09) : 88 - 89+16
  • [30] VPCID-A VoIP Phone Call Identification Database
    Huang, Yuankun
    Tan, Shunquan
    Li, Bin
    Huang, Jiwu
    DIGITAL FORENSICS AND WATERMARKING, IWDW 2018, 2019, 11378 : 307 - 321