Skip to main content
Log in

VoIP encryption module for securing privacy

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A VoIP encryption module was designed to prevent eavesdropping on Internet telephones communications and involved encoding/decoding the output data at the transmitter and receiver of the Internet telephone. To reduce the voice delay, a 128 bit AES was used and an RSA algorithm for an asymmetric encoding system was used during the key exchange, which is the first process of the encryption system operation. In order to test the speech quality in the encryption system, a Mean Opinion Score (MOS) value and R-value (E Model) Score were measured and resulted in values of 4.18~4.20 (Good) and 91.77~92.92 (Good), respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. R0: Circuit Noise, Is : OLR Sidetone, Id : Echo of transmitter and receiver, Ie: Low Bit Rate Encoding, A : Subjective quality of Mobile Communication

References

  1. Abdelnur H, Cridlig V, State R, Festor O. “VoIP security assessment: method and tools”. In Proc. of IEEE workshop on VoIP management and security, pp. 29, Jun, 2006

  2. Collins D (2001) Carrier grade voice over IP. McGraw-Hill

  3. Edelson E (2005) Voice over IP: security pitfalls. Netw Secur 2:4–7

    Article  Google Scholar 

  4. Eyers T, Schulzrinne H. Predicting internet telephony call setup delay. In IPTel 2000, April 2000

  5. Hunter P (2002) VoIP the latest security concern: DoS attack the greatest threat. Netw Secur 11:5–7

    Article  Google Scholar 

  6. International Telecommunication Union (ITU). Visual telephone systems and equipment for local area networks which provide a non-guaranteed quality of service. Telecommunication Standardization Sector of ITU. Geneva, Switzerland, May 1996. Recommendation H.323

  7. Nartin MV, Hung PCK. “Towards a security policy for VoIP applications”. In Proc. of Conf. on Electrical and Computer Eng., pp. 65, Jan. 2006

  8. Rosenberg J, Schulzrinne H, Camarillo G, Johnston A, Peterson J, Sparks R, Handley M, Schooler E. SIP: session initiation protocol, July 2002. RFC 3261

  9. Shan L, Jiang N. “Research on security mechanisms of SIP-based VoIP system.” In Proc. of Int. Conf. on Hybrid Intelligent Systems, vol. 2, pp. 408–410, Sept. 2009

  10. Yoon S, Jeong J, Jeong H. “A study on the tightening the security of the key management protocol for VoIP”. In Proc. of New Trends in Information Science and Service Science, pp. 638, Jun, 2010

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Byounghee Son.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Son, B., Nahm, E. & Kim, H. VoIP encryption module for securing privacy. Multimed Tools Appl 63, 181–193 (2013). https://doi.org/10.1007/s11042-011-0956-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-011-0956-1

Keywords

Navigation