Qphone: A Quantum Security VoIP Phone

被引:8
|
作者
Liu, Bo [1 ]
Zhao, Baokang [1 ]
Wei, Ziling [1 ]
Wu, Chunqing [1 ]
Su, Jinshu [1 ]
Yu, Wanrong [1 ]
Wang, Fei [1 ]
Sun, Shihai [2 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha, Hunan, Peoples R China
[2] Natl Univ Def Technol, Dept Phys, Changsha, Hunan, Peoples R China
关键词
Measurement; Design; Experimentation; Security; Quantum Communication; VoIP; steganography; security;
D O I
10.1145/2534169.2491696
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a novel quantum security VoIP phone, called Qphone. Qphone integrates quantum key distribution (QKD) and VoIP steganography, and achieves peer-to-peer communication with information-theoretical security (ITS) guaranteeing. Qphone consists of three parts, a real-time QKD system, RT-QKD, a steganography software, VS-Phone, and an audio encryption and authentication hardware, AE-KEY. RT-QKD explores QKD technologies, and is able establish a shared key between two peers ensuring ITS. VS-Phone utilizes VoIP steganography to protect transmission channels of sensitive information. Qphone can provide efficient and real-time security protections to meet different security demands.
引用
收藏
页码:477 / 478
页数:2
相关论文
共 50 条
  • [31] Reducing Latency for an Android-based VoIP Phone
    You, Shingchern D.
    Chang, Jeremy
    2018 7TH IEEE INTERNATIONAL SYMPOSIUM ON NEXT-GENERATION ELECTRONICS (ISNE), 2018, : 141 - 144
  • [32] Evaluating the Security of Enterprise VoIP Networks
    Thermos, Peter
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 328 - 336
  • [33] VoIP security gets more visible
    Goth, Greg
    IEEE INTERNET COMPUTING, 2006, 10 (06) : 8 - 10
  • [34] Security challenge and Defense in VoIP infrastructures
    Butcher, David
    Li, Xiangyang
    Guo, Jinhua
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2007, 37 (06): : 1152 - 1162
  • [35] VoIP Security: Vulnerabilities, Exploits, and Defenses
    Wang, Xinyuan
    Zhang, Ruishan
    ADVANCES IN COMPUTERS, VOL 81, 2011, 81 : 1 - 49
  • [36] Covert channel for improving VoIP security
    Mazurczyk, Wojciech
    Kotulski, Zbigniew
    ADVANCES IN INFORMATION PROCESSING AND PROTECTION, 2007, : 271 - +
  • [37] An Empirical Study of Security of Voip System
    Ghafarian, Ahmad
    Seno, Seyed Amin Hosseini
    Dehghani, Maria
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1031 - 1036
  • [38] VISOR: VoIP security using reputation
    Yang, Weilai
    Judge, Paul
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1489 - 1493
  • [39] Security considerations in current VOIP protocols
    Fries, Steffen
    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography, 2006, : 183 - 191
  • [40] VoIP security assessment: Methods and tools
    Abdelnur, H.
    Cridlig, V.
    State, R.
    Festor, O.
    VOIP MASE 06: 1ST IEEE WORKSHOP ON VOIP MANAGEMENT AND SECURITY: SECURING AND MANAGING VOIP COMMUNICATIONS, 2006, : 29 - +