Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. (Datavetenskap)
Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT. (PriSec)
2010 (English)In: Communications and Multimedia Security: Proceedings of the 11th IFIP TC 6/TC 11, CMS2010, international conference on Communications and Multimedia Security / [ed] De Decker, Bart; Schaumüller-Bichl, Ingrid, Berlin: Springer , 2010, 130-141 p.Conference paper, (Refereed)
Abstract [en]

Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible services. However, VoIP calling anonymity, particularly to withhold who called whom, is difficult to achieve since VoIP infrastructures are usually deployed in an open networking environment (e.g., the Internet). Our work studies an anonymisation overlay network (AON) based solution to prevent surveillance from external attackers, who are able to wiretap the communication channels as well as to manipulate voice packets in the channels. However, it has been demonstrated that the VoIP combined with traditional AONs are vulnerable to two attacks, namely watermark attack and complementary matching attack. Taking these two attacks into account, we investigate the defensive dropping method in VoIP: A VoIP user-agent sends packets to an AON in a constant rate, but packets during periods of silence are marked. Then, the AON drops some silence packets and forwards the remaining ones to their destinations. The result of our experiments shows that the dropping rate must be carefully selected to counteract both of the two attacks. Finally, we discuss further threats in terms of this solution

Place, publisher, year, edition, pages
Berlin: Springer , 2010. 130-141 p.
Series
Lecture Notes on Computer Science, 6109
National Category
Computer Science
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-9971DOI: 10.1007/978-3-642-13241-4_13ISBN: 9783642132407 (print)OAI: oai:DiVA.org:kau-9971DiVA: diva2:493485
Conference
11th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS2010), Linz, Austria
Available from: 2012-02-08 Created: 2012-02-08 Last updated: 2012-08-28Bibliographically approved
In thesis
1. Unwanted Traffic and Information Disclosure in VoIP Networks: Threats and Countermeasures
Open this publication in new window or tab >>Unwanted Traffic and Information Disclosure in VoIP Networks: Threats and Countermeasures
2012 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The success of the Internet has brought significant changes to the telecommunication industry. One of the remarkable outcomes of this evolution is Voice over IP (VoIP), which enables realtime voice communications over packet switched networks for a lower cost than traditional public switched telephone networks (PSTN). Nevertheless, security and privacy vulnerabilities pose a significant challenge to hindering VoIP from being widely deployed. The main object of this thesis is to define and elaborate unexplored security and privacy risks on standardized VoIP protocols and their implementations as well as to develop suitable countermeasures. Three research questions are addressed to achieve this objective:

Question 1:  What are potential unexplored threats in a SIP VoIP network with regard to availability, confidentiality and privacy by means of unwanted traffic and information disclosure?

Question 2:  How far are existing security and privacy mechanisms sufficient to counteract these threats and what are their shortcomings?

Question 3:  How can new countermeasures be designed for minimizing or preventing the consequences caused by these threats efficiently in practice?

Part I of the thesis concentrates on the threats caused by "unwanted traffic", which includes Denial of Service (DoS) attacks and voice spam. They generate unwanted traffic to consume the resources and annoy users. Part II of this thesis explores unauthorized information disclosure in VoIP traffic. Confidential user data such as calling records, identity information, PIN code and data revealing a user's social networks might be disclosed or partially disclosed from VoIP traffic. We studied both threats and countermeasures by conducting experiments or using theoretical assessment. Part II also presents a survey research related to threats and countermeasures for anonymous VoIP communication.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2012. 32 p.
Series
Karlstad University Studies, ISSN 1403-8099 ; 2012:28
Keyword
SIP, VoIP, security, Denial of Service, Vulnerability analysis, timing attacks, Spam, DTMF, SIP, RTP
National Category
Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-13408 (URN)978-91-7063-432-1 (ISBN)
Public defence
2012-09-14, 1 B 306, Universitetsgatan 2, Karlstad, 10:15 (English)
Opponent
Supervisors
Available from: 2012-08-28 Created: 2012-05-29 Last updated: 2012-08-28Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full texthttp://www.springerlink.com/content/x6727120821x2568/http://www.cs.kau.se/gezhang/anon.pdf

Search in DiVA

By author/editor
Zhang, GeFischer Hübner, Simone
By organisation
Department of Computer ScienceCentre for HumanIT
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 269 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf