Abstract
The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the I9th century to an automatically switched grid of copper-wired, fiber optical and radio linked portions carrying digitally encoded voice and other data. Simultaneously, as our security consciousness increases, so does our desire to keep our conversations private. Applied to the traffic traversing the globe on the public telephone network, privacy requires that our telephone companies provide us with a service whereby unintended third parties are unable to access other’s information. However, existing public telephone network infrastructures do not provide such a service. This paper proposes a security architecture that provides end-to-end voice privacy and authentication services within the boundaries of the existing public telephone network infrastructures. Proposed architecture uses public key cryptography for authentication and key distribution, and symmetric key cryptography for voice privacy. This work is a part of an on going project on securing telecommunication system architectures and protocols.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35691-4_52
Chapter PDF
Similar content being viewed by others
Key words
References
Berman, R. K. and Brewster, J. H.. “Perspective on the AIN Architecture”, IEEE Communications Magazine, 31, No. 2, February 1992.
Black, U., “ISDN and SS7”, Prentice Hall PTR, Upper Saddle River, New Jersey, 1997.
Bosse, J. G. von, “Signaling IN Telecommunication Networks”, John Wiley & Sons, New York, 1998.
Baum, M. S. and Ford, W., “Secure Electronic Commerce”, Prentice Hall PTR, Upper Saddle River, New Jersey, 1997.
Carne, E. B., “Telecommunications Primer, Second Edition”, Prentice Hall PTR, Upper Saddle River, New Jersey, 1999.
Chlamtac, I., and Lin, Y., “Wireless and Mobile Network Architectures”, John Wiley & Sons, New York, 2001.
Chow, M., “Understanding Telecommunications: Systems, Networks and Applications”, Volume I, Andan Publisher, Holmdel, New Jersey, 2000.
Douskalis, B., “IP Telephony”, Prentice Hall PTR, Upper Saddle River, New Jersey, 2000.
Gallagher, M. D. and Snyder, R. A., “Wireless Telecommunications Networking with ANSI-41”, Second Edition, McGraw-Hill, New York, 2001.
Modarressi, A. R., and Skoog, R. A., “Signaling System No. 7: A Tutorial”, IEEE Communications Magazine, pp. 19–35, July 1990.
Noll, A. M., “Introduction to Telephones and Telephone Systems”, Third Edition, Artech House, Boston. 1998.
Rappaport, T. S., “Wireless Communications”, Prentice Hall PTR, Upper Saddle River, New Jersey, 2002.
Rose, G., “Authentication and Security in Mobile Phones”, http://people.qualcomm.com/ggr/QC/AUUG99AuthSec.pdf
Russell, T., “Signaling System # 7”, Second Edition, McGraw-Hill, New York, 1998.
Schneier, B., “Applied Cryptography”, Second Edition, John Wiley & Sons, New York, 1996.
Scourias, J., “Overview of the Global System for Mobile Communications”, http://ccnga.uwaterloo.ca/-jscouria/GSM/gsmreport.html.
Stallings, W., “ISDN: An Introduction”, Macmillan Publishing Company, New York, 1989.
Stallings, W., “Cryptography and Network Security”, Second Edition, Prentice Hall PTR, Upper Saddle River, New Jersey, 1999.
Tanenbaum, A. S., “Computer Networks” third Edition, Prentice Hall PTR, Upper Saddle River, New Jersey, 1996.
Department of Defense Security Institute, “STU-Ill Handbook for Industry”, http://www.tscm.com/STUlllhandbook.html, February 1997.
ISAAC security research group, “GSM Cloning”, http://www.isaac.cs.berkeley.edulisaac/gsm-faq.html,http://www.isaac.cs.berkeley.edu/isaac/gsm.html.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFIP International Federation for Information Processing
About this paper
Cite this paper
Sharif, M., Wijesekera, D. (2003). Providing Voice Privacy over Public Switched Telephone Networks. In: Gritzalis, D., De Capitani di Vimercati, S., Samarati, P., Katsikas, S. (eds) Security and Privacy in the Age of Uncertainty. SEC 2003. IFIP — The International Federation for Information Processing, vol 122. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35691-4_3
Download citation
DOI: https://doi.org/10.1007/978-0-387-35691-4_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6489-5
Online ISBN: 978-0-387-35691-4
eBook Packages: Springer Book Archive