Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Secured Routing Protocol Based on Secret Sharing in Voice Systems


Affiliations
1 Manonmaniam Sundaranar University, Tirunelveli, India
2 Sree Narayana Guru College, Coimbatore-641105, India
     

   Subscribe/Renew Journal


Voice over IP is the process of transmission of voice over packet-switched IP networks is one of the most important emerging trends in telecommunications. The VOIP introduces both security risks and opportunities. VOIP has a very different architecture than traditional circuit-based telephony, and these differences result in significant security issues. Lower cost and greater flexibility are among the promises of VOIP for the enterprise, but VOIP should not be installed without careful consideration of the security problems introduced. VOIP systems take a wide variety of forms, including traditional telephone handsets, conferencing units, and mobile units. In addition to end-user equipment, VOIP systems include a variety of other components, including call processors/call managers, gateways, routers, firewalls, and protocols. Most of these components have counterparts used in data networks, but the performance demands of VOIP mean that ordinary network software and hardware must be supplemented with special VOIP components. Quality of Service (QoS) is fundamental to the operation of a VOIP network that meets users’ quality expectations. However, the implementation of various security measures can cause a marked deterioration in QoS. These complications range from firewalls delaying or blocking call setups to encryption-produced latency and delay variation (jitter). Because of the time-critical nature of VOIP, and its low tolerance for disruption and packet loss, many security measures implemented in traditional data networks are simply not applicable to VOIP in their current form; firewalls, intrusion detection systems, and other components must be specialized for VOIP. Thus an anonymous multipath routing protocol that is a secured protocol called AOMDV, based on secret sharing is proposed. The protocol provides identity anonymity, location anonymity, data and traffic anonymity by employing cryptograph technology and secret sharing in VOIP communication process. Simulation results show that the proposed scheme provides a reasonably good level of network security.

Keywords

Voice Over IP, AOMDV, Quality of Service, Multipath Routing, Secret Sharing, Anonymity.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 161

PDF Views: 1




  • Secured Routing Protocol Based on Secret Sharing in Voice Systems

Abstract Views: 161  |  PDF Views: 1

Authors

C. Chandrasekar
Manonmaniam Sundaranar University, Tirunelveli, India
S. Padmavathy
Sree Narayana Guru College, Coimbatore-641105, India

Abstract


Voice over IP is the process of transmission of voice over packet-switched IP networks is one of the most important emerging trends in telecommunications. The VOIP introduces both security risks and opportunities. VOIP has a very different architecture than traditional circuit-based telephony, and these differences result in significant security issues. Lower cost and greater flexibility are among the promises of VOIP for the enterprise, but VOIP should not be installed without careful consideration of the security problems introduced. VOIP systems take a wide variety of forms, including traditional telephone handsets, conferencing units, and mobile units. In addition to end-user equipment, VOIP systems include a variety of other components, including call processors/call managers, gateways, routers, firewalls, and protocols. Most of these components have counterparts used in data networks, but the performance demands of VOIP mean that ordinary network software and hardware must be supplemented with special VOIP components. Quality of Service (QoS) is fundamental to the operation of a VOIP network that meets users’ quality expectations. However, the implementation of various security measures can cause a marked deterioration in QoS. These complications range from firewalls delaying or blocking call setups to encryption-produced latency and delay variation (jitter). Because of the time-critical nature of VOIP, and its low tolerance for disruption and packet loss, many security measures implemented in traditional data networks are simply not applicable to VOIP in their current form; firewalls, intrusion detection systems, and other components must be specialized for VOIP. Thus an anonymous multipath routing protocol that is a secured protocol called AOMDV, based on secret sharing is proposed. The protocol provides identity anonymity, location anonymity, data and traffic anonymity by employing cryptograph technology and secret sharing in VOIP communication process. Simulation results show that the proposed scheme provides a reasonably good level of network security.

Keywords


Voice Over IP, AOMDV, Quality of Service, Multipath Routing, Secret Sharing, Anonymity.