text

Voice over IP security and law enforcement

SOAR Repository

Show simple item record

dc.contributor.author Thanthry, Nagaraja
dc.contributor.author Pendse, Ravi
dc.contributor.author Namuduri, Kameswara
dc.date.accessioned 2011-09-27T16:26:09Z
dc.date.available 2011-09-27T16:26:09Z
dc.date.issued 2005-10-11
dc.identifier.citation Thanthry, N.; Pendse, R.; Namuduri, K.; , "Voice over IP security and law enforcement," Security Technology, 2005. CCST '05. 39th Annual 2005 International Carnahan Conference on , vol., no., pp.246-250, 11-14 Oct. 2005 doi: 10.1109/CCST.2005.1594888 en_US
dc.identifier.isbn 0780392450
dc.identifier.uri http://hdl.handle.net/10057/3823
dc.identifier.uri http://dx.doi.org/10.1109/CCST.2005.1594888
dc.description The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954 en_US
dc.description.abstract Voice over IP is one of the fastest growing Internet based application in today's networking world. As more and more enterprises are moving towards IP based voice network, the payload security has become an important issue. The voice traffic is exposed to the same threats as the normal data traffic. However, with voice traffic, the security and accessibility requirements are different from the data traffic. While it is important to protect the voice packets from spoofing and eves dropping, it is equally important that the law enforcement agencies gain access to these voice packets when legally required. With the deployment of security mechanisms like encryption, it becomes harder for the law enforcement agencies to decipher the information hidden in the IP packets related to voice calls. It would make sense to use standardized encryption techniques with voice over IP, at the same time provide a means to decipher the data as and when needed. This would provide the law enforcement agencies an easier access to the information during critical situations provided they have access to the encryption keys. The emphasis should be placed on the choice of encryption keys making it difficult for intruders to decipher. In this paper, the authors review the security requirements of voice traffic transmitted via Internet with the law enforcement and security perspective. The authors review the requirements of various law enforcement agencies and assess the impact of security mechanisms deployed in VOIP networks on law enforcement en_US
dc.language.iso en_US en_US
dc.publisher IEEE en_US
dc.relation.ispartofseries Security Technology, 2005. CCST '05. 39th Annual 2005 International Carnahan Conference on;vol., no., pp.246-250
dc.subject Application software en_US
dc.subject Cryptography en_US
dc.subject Data security en_US
dc.subject IP networks en_US
dc.subject Law enforcement en_US
dc.subject Payloads en_US
dc.subject Telecommunication traffic en_US
dc.title Voice over IP security and law enforcement en_US
dc.type Conference paper en_US
dc.description.version Peer reviewed article
dc.rights.holder © IEEE, 2005

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search SOAR


Advanced Search

Browse

My Account

Statistics