Secure and efficient voice-over-IP in a cdma2000® network

被引:0
|
作者
McCann, PJ
Rance, R
Patel, S
机构
[1] Lucent Technol, Wireless Stand Dev & Ind Relat Dept, Naperville, IL 60563 USA
[2] Lucent Technol, Secure Technol Dept, N Andover, MA 01845 USA
[3] Lucent Technol, Wireless Stand Dev & Ind Relat Dept, Whippany, NJ 07981 USA
来源
关键词
D O I
10.1002/ett.989
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper examines how to provide secure and efficient voice-over-IP service on a cdma2000 network. Various alternative solutions and their relationship to header compression techniques are discussed. We propose a new method of end-to-end encryption that could be used to provide privacy even when Header Removal, a cdma2000-specific technique where IP/UDP/RTP headers are discarded before transmission over the air, is in use. The new method relies on a novel variable-length block cipher that can be re-used with fixed parameters across many voice frames, eliminating the requirement to carry precise cryptographic synchronization with each and every voice frame. Instead, the parameters to the block cipher are varied on an infrequent basis, and synchronization information is communicated from the encryptor to the decryptor by overwriting the occasional voice frame, with minimal impact on resulting voice quality. The method offers provable security guarantees given some assumptions about the amount of entropy contained in the encoded speech data. Copyright (C) 2004 AEI.
引用
收藏
页码:405 / 414
页数:10
相关论文
共 50 条
  • [11] Capacity planning strategies for voice-over-IP traffic in the core network
    Van Hoey, G
    Van den Bosch, S
    de la Vallée-Poussin, P
    De Neve, H
    Petit, G
    2001 IEEE WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2001, : 109 - 112
  • [12] QoS requirements for a voice-over-IP PSTN
    Hunt, G
    Arden, P
    BT TECHNOLOGY JOURNAL, 2005, 23 (02) : 37 - 47
  • [13] Voice-over-IP谁领风骚
    李梦晓
    每周电脑报, 1998, (16) : 95 - 95
  • [14] Design and evaluation of steganography for Voice-over-IP
    Kraetzer, Christian
    Dittmann, Jana
    Vogel, Thomas
    Hillert, Reyk
    2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 2006, : 2397 - +
  • [15] Voice-over-IP Security Research and Practice
    Keromytis, Angelos D.
    IEEE SECURITY & PRIVACY, 2010, 8 (02) : 76 - 78
  • [16] Security analysis of Voice-over-IP protocols
    Gupta, Prateek
    Shmatikov, Vitaly
    20th IEEE Computer Security Foundations Symposium (CSFS20), Proceedings, 2007, : 49 - 63
  • [17] Wireless voice-over-IP and implications for third-generation network design
    Wang, J
    McCann, PJ
    Gorrepati, PB
    Liu, CZ
    BELL LABS TECHNICAL JOURNAL, 1998, 3 (03) : 79 - 97
  • [18] ZTE’s All-IP Based CDMA2000 Network Solution
    Liu Shaoyong
    ZTE Telecommunications, 2005, (02) : 30 - 33
  • [19] Experiences with videoconferencing over cdma2000
    Khan, A
    Hamdy, W
    Kandukuri, S
    57TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, VTC 2003-SPRING, VOLS 1-4, PROCEEDINGS, 2003, : 352 - 357
  • [20] Coverage and capacity analysis in cdma2000 network for voice and packet data services
    Jung, YS
    Jeon, HC
    Shin, SM
    Oh, JH
    Kwon, B
    Ihm, JT
    IEEE 54TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2001, VOLS 1-4, PROCEEDINGS, 2001, : 2028 - 2032