Show simple item record

dc.contributor.authorThanthry, Nagaraja
dc.contributor.authorPendse, Ravi
dc.contributor.authorNamuduri, Kameswara
dc.date.accessioned2011-09-27T16:26:09Z
dc.date.available2011-09-27T16:26:09Z
dc.date.issued2005-10-11
dc.identifier.citationThanthry, N.; Pendse, R.; Namuduri, K.; , "Voice over IP security and law enforcement," Security Technology, 2005. CCST '05. 39th Annual 2005 International Carnahan Conference on , vol., no., pp.246-250, 11-14 Oct. 2005 doi: 10.1109/CCST.2005.1594888en_US
dc.identifier.isbn0780392450
dc.identifier.urihttp://hdl.handle.net/10057/3823
dc.identifier.urihttp://dx.doi.org/10.1109/CCST.2005.1594888
dc.descriptionThe full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954en_US
dc.description.abstractVoice over IP is one of the fastest growing Internet based application in today's networking world. As more and more enterprises are moving towards IP based voice network, the payload security has become an important issue. The voice traffic is exposed to the same threats as the normal data traffic. However, with voice traffic, the security and accessibility requirements are different from the data traffic. While it is important to protect the voice packets from spoofing and eves dropping, it is equally important that the law enforcement agencies gain access to these voice packets when legally required. With the deployment of security mechanisms like encryption, it becomes harder for the law enforcement agencies to decipher the information hidden in the IP packets related to voice calls. It would make sense to use standardized encryption techniques with voice over IP, at the same time provide a means to decipher the data as and when needed. This would provide the law enforcement agencies an easier access to the information during critical situations provided they have access to the encryption keys. The emphasis should be placed on the choice of encryption keys making it difficult for intruders to decipher. In this paper, the authors review the security requirements of voice traffic transmitted via Internet with the law enforcement and security perspective. The authors review the requirements of various law enforcement agencies and assess the impact of security mechanisms deployed in VOIP networks on law enforcementen_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.ispartofseriesSecurity Technology, 2005. CCST '05. 39th Annual 2005 International Carnahan Conference on;vol., no., pp.246-250
dc.subjectApplication softwareen_US
dc.subjectCryptographyen_US
dc.subjectData securityen_US
dc.subjectIP networksen_US
dc.subjectLaw enforcementen_US
dc.subjectPayloadsen_US
dc.subjectTelecommunication trafficen_US
dc.titleVoice over IP security and law enforcementen_US
dc.typeConference paperen_US
dc.description.versionPeer reviewed article
dc.rights.holder© IEEE, 2005


Files in this item

Icon

This item appears in the following Collection(s)

Show simple item record