[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1385289.1385356acmconferencesArticle/Chapter ViewAbstractPublication PagesmobimediaConference Proceedingsconference-collections
research-article

Implementing a VIPSec based application for handhelds: design and optimization issues

Published: 27 August 2007 Publication History

Abstract

Voice over IP technology enabled the growth of Internet telephony applications that make use of public common infrastructures to provide voice and data communications to their users. The growth of wireless Internet enables users to connect to the network from different locations using mobile Internet devices. Security is a major concern for mobile Internet telephony users, yet the lack of secure inline key exchange mechanisms is one of the major drawbacks for the use of these applications for business use. The intrinsic vulnerabilities of wireless networks make the VoWiFI case even worse while compromising security of a call is as easy as breaching human administration security of the service network. In this paper we describe the design and implementation of a secure VoIP application for handheld devices that is using the strong security mechanisms of Voice Interactive Personalized Security protocol (VIPSec). We analyze the architectural fundamentals and we present the implementation elements of the application. User sign-in and other subsidiary procedures follow the Client-Server model while the media path is direct between the users. The application is developed in Java and is suitable for mobile devices running Windows CE or Linux, essentially securing end-to-end voice, video and data communications in wireless communications.

References

[1]
http://www.skype.com
[2]
http://www.voipbuster.com
[3]
http://www.msn.com
[4]
Kopsidas Spyros, Zisiadis Dimitris and Tassiulas Leandros, "Voice interactive personalized security (VoIPSec) protocol: fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification", Hot Topics in Web Systems and Technologies, 2006. HOTWEB '06. 1st IEEE Workshop on, Vol., Iss., Nov.2006, pp. 1--10
[5]
Phil Zimmerman, "ZRTP: Extensions to RTP for Diffie-Hellman Key Agreement for SRTP", Internet Draft
[6]
http://zfoneproject.com
[7]
http://en.wikipedia.org/wiki/Evil_twin_(wireless_networks)
[8]
Savola R., Lehtonen S. and Röning, J., "Information Security Threats in Popular and Emerging Wireless Technologies", Proceedings of the 6th Annual Security Conference. Las Vegas, NV, USA, 11--12 April 2007. The Information Institute. Washington, DC, USA (2007), 25-1--25-11
[9]
Feng Cao and Malik S., "Security analysis and solutions for deploying IP telephony in the critical infrastructure", Security and Privacy for Emerging Areas in Communication Networks, 2005. Workshop of the 1st International Conference on, Vol., Iss., 5--9 Sept. 2005 pp. 171--180
[10]
G. Me and D. Verdone, "An overview of some techniques to exploit VoIP over WLAN", Digital Telecommunications, 2006. ICDT '06. International Conference on, Vol., Iss., 2006 p. 67
[11]
Phil Zimmerman, Jon Callas, "ZRTP and ZFone", NOMS 2006, 3rd April 2006.
[12]
Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik and Ersin Uzun, "Loud and clear: human verifiable authentication based on audio", Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on, Vol., Iss., 2006 p. 10
[13]
Cagalj M., Capkun S. and Hubaux J.-P., "Key agreement in peer-to-peer wireless networks", Proceedings of the IEEE, Vol. 94, Iss. 2, Feb. 2006 pp. 467--478
[14]
http://vipsec.inf.uth.gr/PresentApplet1.html
[15]
http://vipsec.inf.uth.gr/PresentApplet2.html
[16]
http://en.wikipedia.org/wiki/Diffie-Hellman
[17]
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
[18]
King Tom, "Packet Sniffing In a Switched Environment", SANS Institute, July 2006, http://www.sans.org/reading_room/whitepapers/networkdevs/244.php
[19]
Deckerd Gary, "Wireless attacks from an intrusion detection perspective", SANS Institute, November 2006, http://www.sans.org/reading_room/whitepapers/honors/1681.php
[20]
Philippe Biondi, Fabrice Desclaux, "Silver needle in the Skype", BlackHat Europe, March 2nd and 3rd 2006.
[21]
http://www.speex.org
[22]
http://en.wikipedia.org/wiki/Java_(programming_language)
[23]
http://java.sun.com/products/java-media/jmf/
[24]
http://en.wikipedia.org/wiki/Data_Encryption_Standard

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiMedia '07: Proceedings of the 3rd international conference on Mobile multimedia communications
August 2007
403 pages
ISBN:9789630626705

Sponsors

Publisher

ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

Brussels, Belgium

Publication History

Published: 27 August 2007

Check for updates

Author Tags

  1. VoIP applications
  2. mobile devices
  3. personal communications
  4. privacy

Qualifiers

  • Research-article

Conference

MobiMedia07
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 202
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media