首页> 外文会议>International Conference on Modelling Optimization and Computing >A Trustable Key Exchange Protocol for Mobile Oriented VoIP Devices via ECDH and Synchronous Key Update Mechanism
【24h】

A Trustable Key Exchange Protocol for Mobile Oriented VoIP Devices via ECDH and Synchronous Key Update Mechanism

机译:经由ECDH和同步密钥更新机制的移动导向VoIP设备可值得信赖的密钥交换协议

获取原文

摘要

This paper presents a new innovative key exchange protocol for mobile VoIP devices. Further we analyze the existing key exchange protocols namely MTKEY, ZRTP and SDES and their vulnerability towards Man-In-The-Middle attack. The focused research area in VoIP is related to the Security and Quality of service of the voice data. Among these areas VoIP security and confidentiality of voice data turns to be a challenging one .As VoIP delivers the voice packet over the public internet, using the transparent IP protocol suite the confidentiality of the voice data is at risk. Moreover exchanging cryptographic keys to encrypt the media stream in the Session Initiation Protocol has proven to be quite difficult task. The existing key exchange protocols have been quite vulnerable to the Man-In-The-Middle attack. Therefore there is a need for stronger key management protocol which will secure the voice data from all types of attack and which also provides a feasible key exchange mechanism. In our approach we go for a two tier key exchange mechanism, in which the first tier involves ECDH for key seeding and the second tier involves a Key Generation Function (KGF), which takes care to the key update by consuming absolutely zero bandwidth. Here we take care to that this mechanism yields a very effective mechanism for preserving the confidentiality of the voice data without affecting the quality of the voice in Mobile Based VoIP devices.
机译:本文为移动VoIP设备提出了一种新的创新关键交换协议。此外,我们分析了现有的密钥交换协议即将MTKey,Zrtp和SDES及其对中间人攻击的漏洞。 VoIP中的重点研究区域与语音数据的安全性和质量有关。在这些领域,语音数据的VoIP安全性和机密性转变为一个具有挑战性的.AS VoIP通过公共因特网提供语音数据包,使用透明IP协议套件语音数据的机密性处于危险之中。此外,在会话启动协议中交换加密媒体流的加密密钥已被证明是相当困难的任务。现有的关键交换协议非常容易受到中间人攻击的影响。因此,需要更强的密钥管理协议,其将保护来自所有类型的攻击的语音数据,并且还提供可行的密钥交换机制。在我们的方法中,我们前往两层密钥交换机制,其中第一层涉及ECDH用于关键播种,第二层涉及密钥生成函数(KGF),这通过消耗绝对零带宽来处理密钥更新。在这里,我们注意到这种机制产生了一种非常有效的机制,用于保留语音数据的机密性而不影响移动基于移动的VoIP设备中的语音的质量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号