首页> 外文学位 >Effective identities for trusted interactions in converged telecommunication systems.
【24h】

Effective identities for trusted interactions in converged telecommunication systems.

机译:融合电信系统中可信交互的有效身份。

获取原文
获取原文并翻译 | 示例

摘要

Telecommunication systems have evolved significantly since their inception and the recent convergence of telephony infrastructure allows users to communicate through a variety of ways including landlines, mobile phones and Voice over IP (VoIP) phones. While cellular and public switched telephone (PSTN) networks use Caller ID to identify users, VoIP networks employ user ids, similar to email, to identify users. However, in all these networks this identity is locally asserted and is therefore easily manipulated. It is easiest to assert any identity within IP networks and this has resulted in VoIP spam (e.g., the recent Skype Computer Repair spam calls). As IP networks converge with other PSTN and cellular networks, it has also become easy to assert any Caller ID across these networks. The larger issue of Caller-ID spoofing has increasingly contributed to credit card fraud and identity theft. To address this, we introduce the notion of effective identity which is a combination of mechanisms to (1) establish identity of the caller that is harder to manipulate, and (2) provide additional information about the caller when necessary.;In this dissertation, we first look at the specific issue of determining the legitimacy (additional information) of a user id within IP networks to address the VoIP spam problem. We propose CallRank, a novel mechanism built around call duration and social network linkages to differentiate between a legitimate user and a spammer. We realize that any system that determines the legitimacy of users based on their social network linkages leaks private information. To address this, we create a to- ken/credential framework that allows a user to prove the existence of a social network path between him/her and the user he/she is trying to initiate contact with, without actually revealing the path. We combine the privacy properties of two techniques in cryptography: Delegatable Anonymous Credentials (DAC) and E-Cash to create this framework. We then look at the broader issue of determining identity across the entire telecommunication landscape to address the issue of Caller ID spoofing. Towards this, we develop PinDr0p, a technique to determine the provenance of a call - the source and the path taken by a call. In particular, we show that the codec transformations applied by multiple intermediary networks, in combination with packet loss and noise characteristics, allow us to develop profiles for various call sources based solely on features extracted from the received audio. In the absence of any verifiable metadata, these profiles offer a means of developing specific fingerprints that help uniquely identify a call source. We show that the audio can also provide valuable additional information. We use anomalies in timbre created by different undersea telecommunication cables to develop London Calling, a mechanism to identify geography of a caller. Together, the contributions made in this dissertation create effective identities that can help address the new threats in a converged telecommunication infrastructure.
机译:自电信系统问世以来,电信系统已经有了长足发展,并且电话基础设施的最新融合使用户可以通过多种方式进行通信,包括座机,移动电话和IP语音(VoIP)电话。蜂窝和公共交换电话(PSTN)网络使用呼叫者ID来标识用户,而VoIP网络使用类似于电子邮件的用户ID来标识用户。但是,在所有这些网络中,此身份都是在本地声明的,因此很容易操纵。最容易断言IP网络中的任何身份,这会导致VoIP垃圾邮件(例如,最近的Skype Computer Repair垃圾邮件呼叫)。随着IP网络与其他PSTN和蜂窝网络融合,在这些网络上声明任何主叫方ID也变得很容易。更大的呼叫者ID欺骗问题已日益导致信用卡欺诈和身份盗用。为了解决这个问题,我们引入了有效身份的概念,它是以下机制的组合:(1)建立较难操纵的呼叫者身份,(2)必要时提供有关呼叫者的其他信息。我们首先来看确定IP网络中用户ID的合法性(附加信息)以解决VoIP垃圾邮件问题的具体问题。我们建议使用CallRank,这是一种基于通话时间和社交网络链接构建的新颖机制,用于区分合法用户和垃圾邮件发送者。我们意识到,任何基于用户社交网络链接确定用户合法性的系统都会泄漏私人信息。为了解决这个问题,我们创建了一个令牌/凭证框架,该框架允许用户证明他/她与他/她试图与之联系的用户之间存在社交网络路径,而无需实际揭示路径。我们结合了两种密码学技术的隐私属性:可授权匿名凭证(DAC)和电子现金,以创建此框架。然后,我们将探讨确定整个电信领域中的身份这一更广泛的问题,以解决呼叫方ID欺骗的问题。为此,我们开发了PinDr0p,这是一种确定呼叫来源的技术-呼叫所采用的来源和路径。特别是,我们证明了由多个中间网络应用的编解码器转换,结合丢包和噪声特性,使我们能够仅基于从接收到的音频中提取的特征来开发各种呼叫源的配置文件。在没有任何可验证的元数据的情况下,这些配置文件提供了一种开发特定指纹的方法,可以帮助唯一地识别呼叫源。我们证明了音频还可以提供有价值的附加信息。我们使用由不同的海底通信电缆产生的音色异常来开发伦敦呼叫,这是一种识别呼叫者地理位置的机制。总之,本文所做出的贡献创造了有效的身份,可以帮助应对融合电信基础设施中的新威胁。

著录项

  • 作者

    Balasubramaniyan, Vijay A.;

  • 作者单位

    Georgia Institute of Technology.;

  • 授予单位 Georgia Institute of Technology.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2011
  • 页码 142 p.
  • 总页数 142
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号