Skip to main content

2016 | OriginalPaper | Buchkapitel

A Practical Scheme for Data Secure Transport in VoIP Conferencing

verfasst von : Dali Zhu, Renjun Zhang, Xiaozhuo Gu, Haitao Zhu

Erschienen in: Information and Communications Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the Multi-party VoIP conferencing system, it is important to provide properties of non-repudiation, unforgeable, and privacy. Previous work usually achieve these goals by using digital signature, TLS, IPsec, or other cryptographic tools. However, many approaches either compromise performance or lack of formal security proof, or both. In this work, we construct a practical Multi-party VoIP conferencing scheme based on the Boneh-Canetti-Halevi-Katz construction. Our work focus on the data secure transport stage, (i.e., we assume that the group session key is already distributed in the key distribution stage.). In comparison with previous work, our scheme gives a new paradigm for achieving properties of non-repudiation, unforgeable, and privacy simultaneously. The new paradigm avoids digital signature that have been shown time-consuming. On the other hand, our scheme is provable security. We prove the non-repudiation property in a formal way, and give proof sketches of unforgeable property and privacy property.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Barbieri, R., Bruschi, D., Rosti, E.: Voice over IPsec: analysis and solutions. In: 18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, USA, 9–13 December 2002, pp. 261–270 (2002) Barbieri, R., Bruschi, D., Rosti, E.: Voice over IPsec: analysis and solutions. In: 18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, USA, 9–13 December 2002, pp. 261–270 (2002)
2.
Zurück zum Zitat Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 36(5), 1301–1328 (2007)MathSciNetCrossRefMATH Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 36(5), 1301–1328 (2007)MathSciNetCrossRefMATH
3.
Zurück zum Zitat Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 87–103. Springer, Heidelberg (2005). doi:10.1007/978-3-540-30574-3_8 CrossRef Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 87–103. Springer, Heidelberg (2005). doi:10.​1007/​978-3-540-30574-3_​8 CrossRef
4.
Zurück zum Zitat Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207–222. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24676-3_13 CrossRef Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207–222. Springer, Heidelberg (2004). doi:10.​1007/​978-3-540-24676-3_​13 CrossRef
5.
Zurück zum Zitat Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall/CRC Cryptography and Network Security Series. Chapman & Hall/CRC, Boca Raton (2007)MATH Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall/CRC Cryptography and Network Security Series. Chapman & Hall/CRC, Boca Raton (2007)MATH
6.
Zurück zum Zitat Keromytis, A.D.: A comprehensive survey of voice over IP security research. IEEE Commun. Surv. Tutor. 14(2), 514–537 (2012)CrossRef Keromytis, A.D.: A comprehensive survey of voice over IP security research. IEEE Commun. Surv. Tutor. 14(2), 514–537 (2012)CrossRef
8.
Zurück zum Zitat Kuntze, N., Schmidt, A.U., Hett, C.: Non-repudiation in internet telephony. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., Solms, R. (eds.) SEC 2007. IIFIP, vol. 232, pp. 361–372. Springer, Heidelberg (2007). doi:10.1007/978-0-387-72367-9_31 CrossRef Kuntze, N., Schmidt, A.U., Hett, C.: Non-repudiation in internet telephony. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., Solms, R. (eds.) SEC 2007. IIFIP, vol. 232, pp. 361–372. Springer, Heidelberg (2007). doi:10.​1007/​978-0-387-72367-9_​31 CrossRef
9.
Zurück zum Zitat Salsano, S., Veltri, L., Papalilo, D.: SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw. 16(6), 38–44 (2002)CrossRef Salsano, S., Veltri, L., Papalilo, D.: SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw. 16(6), 38–44 (2002)CrossRef
10.
Zurück zum Zitat Wang, C., Liu, Y.: A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes. J. Netw. Comput. Appl. 34(5), 1545–1556 (2011)CrossRef Wang, C., Liu, Y.: A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes. J. Netw. Comput. Appl. 34(5), 1545–1556 (2011)CrossRef
11.
Zurück zum Zitat Wang, X., Zhang, R., Yang, X., Jiang, X., Wijesekera, D.: Voice pharming attack and the trust of VoIP. In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, 22–25 September 2008, p. 24 (2008) Wang, X., Zhang, R., Yang, X., Jiang, X., Wijesekera, D.: Voice pharming attack and the trust of VoIP. In: 4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, 22–25 September 2008, p. 24 (2008)
12.
Zurück zum Zitat Wu, C.-Y., Wu, K.-P., Shih, J., Lee, H.-M.: VoIPS: VoIP secure encryption VoIP solution. In: Chang, R.-S., Kim, T., Peng, S.-L. (eds.) SUComS 2011. CCIS, vol. 223, pp. 84–93. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23948-9_11 CrossRef Wu, C.-Y., Wu, K.-P., Shih, J., Lee, H.-M.: VoIPS: VoIP secure encryption VoIP solution. In: Chang, R.-S., Kim, T., Peng, S.-L. (eds.) SUComS 2011. CCIS, vol. 223, pp. 84–93. Springer, Heidelberg (2011). doi:10.​1007/​978-3-642-23948-9_​11 CrossRef
13.
Zurück zum Zitat Xue, R.: Theory of Public Key Encryption (The Chinese Version). Science Press, Beijing (2016) Xue, R.: Theory of Public Key Encryption (The Chinese Version). Science Press, Beijing (2016)
14.
Zurück zum Zitat Zhang, L., Tang, S., Zhu, S.: An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. J. Netw. Comput. Appl. 59, 126–133 (2016)MathSciNetCrossRef Zhang, L., Tang, S., Zhu, S.: An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. J. Netw. Comput. Appl. 59, 126–133 (2016)MathSciNetCrossRef
16.
Zurück zum Zitat Zhu, S., Yang, F., Zhang, L., Tang, S., Li, J.: ECC-based authenticated key agreement protocol with privacy protection for VoIP communications. In: 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, Physical and Social Computing (CPSCom), Beijing, China, 20–23 August 2013, pp. 2114–2118 (2013) Zhu, S., Yang, F., Zhang, L., Tang, S., Li, J.: ECC-based authenticated key agreement protocol with privacy protection for VoIP communications. In: 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, Physical and Social Computing (CPSCom), Beijing, China, 20–23 August 2013, pp. 2114–2118 (2013)
Metadaten
Titel
A Practical Scheme for Data Secure Transport in VoIP Conferencing
verfasst von
Dali Zhu
Renjun Zhang
Xiaozhuo Gu
Haitao Zhu
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-50011-9_36