dc.contributor.author | Thanthry, Nagaraja | |
dc.contributor.author | Goodrich, Christopher | |
dc.contributor.author | Pendse, Ravi | |
dc.date.accessioned | 2011-09-27T16:17:08Z | |
dc.date.available | 2011-09-27T16:17:08Z | |
dc.date.issued | 2006-10 | |
dc.identifier.citation | Nagaraja Thanthry; Christopher Goodrich; Ravi Pendse; , "Calea Compliant Secure Voice Over IP System," Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International , vol., no., pp.191-196, Oct. 2006 doi: 10.1109/CCST.2006.313449 | en_US |
dc.identifier.isbn | 1424401747 | |
dc.identifier.uri | http://hdl.handle.net/10057/3822 | |
dc.identifier.uri | http://dx.doi.org/10.1109/CCST.2006.313449 | |
dc.description | The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954 | en_US |
dc.description.abstract | Voice over IP is one of the fastest growing Internet based application in today's networking world. As more and more enterprises are moving towards IP based voice network, security has become an important issue. The type of threats that voice traffic is exposed to is similar to those experienced by normal data traffic. However with voice traffic, the issues are much more complicated. While it is important to protect the voice packets from spoofing and eavesdropping, it is equally important that law enforcement agencies have access to these voice packets. With the recent terrorist attacks and increased threat to national security, law enforcement agencies require the ability to tap voice calls and screen them for information pertaining to national security. With the deployment of security mechanisms like encryption, it is becoming harder for law enforcement agencies to decipher the information hidden in these IP packets related to voice calls. Hence, it is important that the security mechanism used in these voice calls be standardized. This would provide law enforcement agencies easier access to the information during crisis situations. In this paper, the authors propose a new security mechanism that will help law enforcement agencies in gathering information pertaining to national safety. Initial analysis carried out by the authors indicates that the overhead caused by the proposed protocol has a minimal effect on the voice communication performance | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International;vol., no., pp.191-196 | |
dc.subject | Cryptography | en_US |
dc.subject | Data security | en_US |
dc.subject | IP networks | en_US |
dc.subject | Information security | en_US |
dc.subject | Internet telephony | en_US |
dc.subject | Law enforcement | en_US |
dc.subject | National security | en_US |
dc.subject | Telecommunication traffic | en_US |
dc.subject | Terrorism | en_US |
dc.title | Calea compliant secure voice over IP system | en_US |
dc.type | Conference paper | en_US |
dc.description.version | Peer reviewed article | |
dc.rights.holder | © IEEE, 2006 | |