• Login
    View Item 
    •   Shocker Open Access Repository Home
    • Engineering
    • Electrical Engineering and Computer Science
    • EECS Faculty Scholarship
    • Ravi Pendse
    • Conference proceedings
    • View Item
    •   Shocker Open Access Repository Home
    • Engineering
    • Electrical Engineering and Computer Science
    • EECS Faculty Scholarship
    • Ravi Pendse
    • Conference proceedings
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Alternate encryption scheme for VoIP traffic

    View/Open
    Pendse_2009e (560.5Kb)
    Date
    2009-10-05
    Author
    Pendse, Ravi
    Thanthry, Nagaraja
    Gopalakrishnan, Gopinath
    Metadata
    Show full item record
    Citation
    Thanthry, N.; Gopalakrishnan, G.; Pendse, R.; , "Alternate encryption scheme for VoIP traffic," Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference on , vol., no., pp.178-183, 5-8 Oct. 2009 doi: 10.1109/CCST.2009.5335543
    Abstract
    Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data traffic as well as other traffic categories. Securing VoIP and other real-time traffic is necessary considering the easy ways of hacking communication over internet. Most of the existing security solutions for VoIP such as IPSec, Secure Real Time Protocol (SRTP) and ZRTP use the standard symmetric encryption algorithms for encrypting voice traffic. In this paper, the authors propose an alternate encryption scheme that uses PKI architecture for the initial authentication and key exchange, and encrypts the real-time traffic with a symmetric algorithm using a unique key for each packet. The proposed algorithm expected to be less complex compared to the traditional encryption schemes in addition to enhancing the security of the communication. Initial analysis carried out by the authors indicates that the proposed scheme helps in improving the voice quality to a certain extent while maintaining the security of the communication
    Description
    The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954
    URI
    http://hdl.handle.net/10057/3764
    http://dx.doi.org/10.1109/CCST.2009.5335543
    Collections
    • Conference proceedings
    • EECS Research Publications

    Browse

    All of Shocker Open Access RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace software copyright © 2002-2023  DuraSpace
    DSpace Express is a service operated by 
    Atmire NV