• Login
    View Item 
    •   Shocker Open Access Repository Home
    • Engineering
    • Electrical Engineering and Computer Science
    • EECS Faculty Scholarship
    • Ravi Pendse
    • Conference proceedings
    • View Item
    •   Shocker Open Access Repository Home
    • Engineering
    • Electrical Engineering and Computer Science
    • EECS Faculty Scholarship
    • Ravi Pendse
    • Conference proceedings
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Voice over IP security and law enforcement

    View/Open
    Pendse_2005c (461.6Kb)
    Date
    2005-10-11
    Author
    Thanthry, Nagaraja
    Pendse, Ravi
    Namuduri, Kameswara
    Metadata
    Show full item record
    Citation
    Thanthry, N.; Pendse, R.; Namuduri, K.; , "Voice over IP security and law enforcement," Security Technology, 2005. CCST '05. 39th Annual 2005 International Carnahan Conference on , vol., no., pp.246-250, 11-14 Oct. 2005 doi: 10.1109/CCST.2005.1594888
    Abstract
    Voice over IP is one of the fastest growing Internet based application in today's networking world. As more and more enterprises are moving towards IP based voice network, the payload security has become an important issue. The voice traffic is exposed to the same threats as the normal data traffic. However, with voice traffic, the security and accessibility requirements are different from the data traffic. While it is important to protect the voice packets from spoofing and eves dropping, it is equally important that the law enforcement agencies gain access to these voice packets when legally required. With the deployment of security mechanisms like encryption, it becomes harder for the law enforcement agencies to decipher the information hidden in the IP packets related to voice calls. It would make sense to use standardized encryption techniques with voice over IP, at the same time provide a means to decipher the data as and when needed. This would provide the law enforcement agencies an easier access to the information during critical situations provided they have access to the encryption keys. The emphasis should be placed on the choice of encryption keys making it difficult for intruders to decipher. In this paper, the authors review the security requirements of voice traffic transmitted via Internet with the law enforcement and security perspective. The authors review the requirements of various law enforcement agencies and assess the impact of security mechanisms deployed in VOIP networks on law enforcement
    Description
    The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954
    URI
    http://hdl.handle.net/10057/3823
    http://dx.doi.org/10.1109/CCST.2005.1594888
    Collections
    • Conference proceedings

    Browse

    All of Shocker Open Access RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace software copyright © 2002-2023  DuraSpace
    DSpace Express is a service operated by 
    Atmire NV