Calea compliant secure voice over IP system

Loading...
Thumbnail Image
Authors
Thanthry, Nagaraja
Goodrich, Christopher
Pendse, Ravi
Advisors
Issue Date
2006-10
Type
Conference paper
Keywords
Cryptography , Data security , IP networks , Information security , Internet telephony , Law enforcement , National security , Telecommunication traffic , Terrorism
Research Projects
Organizational Units
Journal Issue
Citation
Nagaraja Thanthry; Christopher Goodrich; Ravi Pendse; , "Calea Compliant Secure Voice Over IP System," Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International , vol., no., pp.191-196, Oct. 2006 doi: 10.1109/CCST.2006.313449
Abstract

Voice over IP is one of the fastest growing Internet based application in today's networking world. As more and more enterprises are moving towards IP based voice network, security has become an important issue. The type of threats that voice traffic is exposed to is similar to those experienced by normal data traffic. However with voice traffic, the issues are much more complicated. While it is important to protect the voice packets from spoofing and eavesdropping, it is equally important that law enforcement agencies have access to these voice packets. With the recent terrorist attacks and increased threat to national security, law enforcement agencies require the ability to tap voice calls and screen them for information pertaining to national security. With the deployment of security mechanisms like encryption, it is becoming harder for law enforcement agencies to decipher the information hidden in these IP packets related to voice calls. Hence, it is important that the security mechanism used in these voice calls be standardized. This would provide law enforcement agencies easier access to the information during crisis situations. In this paper, the authors propose a new security mechanism that will help law enforcement agencies in gathering information pertaining to national safety. Initial analysis carried out by the authors indicates that the overhead caused by the proposed protocol has a minimal effect on the voice communication performance

Table of Contents
Description
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954
Publisher
IEEE
Journal
Book Title
Series
Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International;vol., no., pp.191-196
PubMed ID
DOI
ISSN
EISSN