Secure and efficient voice-over-IP in a cdma2000® network

被引:0
|
作者
McCann, PJ
Rance, R
Patel, S
机构
[1] Lucent Technol, Wireless Stand Dev & Ind Relat Dept, Naperville, IL 60563 USA
[2] Lucent Technol, Secure Technol Dept, N Andover, MA 01845 USA
[3] Lucent Technol, Wireless Stand Dev & Ind Relat Dept, Whippany, NJ 07981 USA
来源
关键词
D O I
10.1002/ett.989
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper examines how to provide secure and efficient voice-over-IP service on a cdma2000 network. Various alternative solutions and their relationship to header compression techniques are discussed. We propose a new method of end-to-end encryption that could be used to provide privacy even when Header Removal, a cdma2000-specific technique where IP/UDP/RTP headers are discarded before transmission over the air, is in use. The new method relies on a novel variable-length block cipher that can be re-used with fixed parameters across many voice frames, eliminating the requirement to carry precise cryptographic synchronization with each and every voice frame. Instead, the parameters to the block cipher are varied on an infrequent basis, and synchronization information is communicated from the encryptor to the decryptor by overwriting the occasional voice frame, with minimal impact on resulting voice quality. The method offers provable security guarantees given some assumptions about the amount of entropy contained in the encoded speech data. Copyright (C) 2004 AEI.
引用
收藏
页码:405 / 414
页数:10
相关论文
共 50 条
  • [21] Decentralized supplementary services for Voice-over-IP telephony
    Spleiss, Christoph
    Kunzmann, Gerald
    DEPENDABLE AND ADAPTABLE NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4606 : 62 - +
  • [22] Information leakage in ubiquitous Voice-over-IP communications
    Neumann, Thorsten
    Tillwick, Heiko
    Olivier, Martin S.
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 233 - 242
  • [23] Skype & Type: Keyboard Eavesdropping in Voice-over-IP
    Cecconello, Stefano
    Compagno, Alberto
    Conti, Mauro
    Lain, Daniele
    Tsudik, Gene
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2019, 22 (04)
  • [24] Voice-data convergence and the corporate voice-over-IP trial
    Catchpole, A
    BRITISH TELECOMMUNICATIONS ENGINEERING, 1999, 17 : 218 - 224
  • [25] Preserving caller anonymity in voice-over-IP networks
    Srivatsa, Mudhakar
    Liu, Ling
    Iyengar, Arun
    PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 50 - +
  • [26] Optimal matrix embedding for Voice-over-IP steganography
    Tian, Hui
    Qin, Jie
    Huang, Yongfeng
    Chen, Yonghong
    Wang, Tian
    Liu, Jin
    Cai, Yiqiao
    SIGNAL PROCESSING, 2015, 117 : 33 - 43
  • [27] Voice-over-IP (VolP) - concepts and commercial offers
    Sellin, Rudiger
    ComTec, 2000, 78 (10): : 24 - 30
  • [28] Efficient QoS support for voice-over-IP applications using selective packet marking
    Sanneck, H
    Le, NTL
    Wolisz, A
    PROCEEDINGS OF THE FIFTH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1 AND 2, 2000, : A553 - A556
  • [29] Dynamic matrix encoding strategy for voice-over-IP steganography
    田晖
    周可
    冯丹
    JournalofCentralSouthUniversityofTechnology, 2010, 17 (06) : 1285 - 1292
  • [30] Adaptive Speech Quality Management in Voice-over-IP Communications
    Myakotnykh, Eugene S.
    Thompson, Richard A.
    AICT: 2009 FIFTH ADVANCED INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, 2009, : 64 - 71