Abstract
A VoIP encryption module was designed to prevent eavesdropping on Internet telephones communications and involved encoding/decoding the output data at the transmitter and receiver of the Internet telephone. To reduce the voice delay, a 128 bit AES was used and an RSA algorithm for an asymmetric encoding system was used during the key exchange, which is the first process of the encryption system operation. In order to test the speech quality in the encryption system, a Mean Opinion Score (MOS) value and R-value (E Model) Score were measured and resulted in values of 4.18~4.20 (Good) and 91.77~92.92 (Good), respectively.
Similar content being viewed by others
Notes
R0: Circuit Noise, Is : OLR Sidetone, Id : Echo of transmitter and receiver, Ie: Low Bit Rate Encoding, A : Subjective quality of Mobile Communication
References
Abdelnur H, Cridlig V, State R, Festor O. “VoIP security assessment: method and tools”. In Proc. of IEEE workshop on VoIP management and security, pp. 29, Jun, 2006
Collins D (2001) Carrier grade voice over IP. McGraw-Hill
Edelson E (2005) Voice over IP: security pitfalls. Netw Secur 2:4–7
Eyers T, Schulzrinne H. Predicting internet telephony call setup delay. In IPTel 2000, April 2000
Hunter P (2002) VoIP the latest security concern: DoS attack the greatest threat. Netw Secur 11:5–7
International Telecommunication Union (ITU). Visual telephone systems and equipment for local area networks which provide a non-guaranteed quality of service. Telecommunication Standardization Sector of ITU. Geneva, Switzerland, May 1996. Recommendation H.323
Nartin MV, Hung PCK. “Towards a security policy for VoIP applications”. In Proc. of Conf. on Electrical and Computer Eng., pp. 65, Jan. 2006
Rosenberg J, Schulzrinne H, Camarillo G, Johnston A, Peterson J, Sparks R, Handley M, Schooler E. SIP: session initiation protocol, July 2002. RFC 3261
Shan L, Jiang N. “Research on security mechanisms of SIP-based VoIP system.” In Proc. of Int. Conf. on Hybrid Intelligent Systems, vol. 2, pp. 408–410, Sept. 2009
Yoon S, Jeong J, Jeong H. “A study on the tightening the security of the key management protocol for VoIP”. In Proc. of New Trends in Information Science and Service Science, pp. 638, Jun, 2010
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Son, B., Nahm, E. & Kim, H. VoIP encryption module for securing privacy. Multimed Tools Appl 63, 181–193 (2013). https://doi.org/10.1007/s11042-011-0956-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-011-0956-1