ABSTRACT
In this paper, a security model is proposed to protect against eavesdropping threats over digital communications. The model is simple to implement with personalized security, but highly effective with a better level of confidentiality performance in operations. There are two stages of protection development. At first, any communicating parties could set up their own common encryption keys with Diffie-Hellman key-exchange protocol, followed by simple encryption rules so-called M:N ratio being notified prior to the start of conversation. By this technique, it is rather difficult for eavesdroppers to discover voice conversation if not totally impossible. The experimental results show that the system could perform its function accurately as designed. In this regard, the proposed system could be further extended and fully implemented for eavesdropping protection over digital networks, without any requirements to modify for changes in presently existing network systems at all.
- ITU-T G.107. The E-Model, a Computational Model for Use in Transmission Planning. (Mar. 2005).Google Scholar
- Markopoulou, A. P., Tobagi, F. A., and Karam, M. J. 2002. Assessment of VoIP Quality over Internet Backbones. In Proceedings of the IEEE INFOCOM (Jun. 2002).Google Scholar
- ITU-T G.113. Transmission Impairments due to Speech Processing. (Feb. 2001).Google Scholar
- ITU-T G.113 Appendix I. Appendix I: Provisional Planning Values for the Equipment Impairment Factor Ie and Packet-Loss Robustness Factor Bpl, (May 2002).Google Scholar
- Rekha, A. B., Umadevi, B., Solanke, Y., and Kolli, S. R. 2005. End-to-End Security for GSM Users. In Proceedings of the IEEE ICPWC (Jan. 2005).Google Scholar
- Tangwongsan, S. and Kassuvan, S. 2007. A Security Model of Voice Eavesdropping Protection over Digital Networks. In Proceedings of WASET (Apr. 2007).Google Scholar
- Tangwongsan, S. and Kassuvan, S. 2008. A Security Model of Multiparty Conference with Eavesdropping Protection over Digital Networks. In Proceedings of the IEEE ICCT (Nov. 2008).Google Scholar
- Qi, H. F., Yang, X. H., Jiang, R., Liang, B., and Zhou, S. J. 2008. Novel End-to-End Voice Encryption Method in GSM System. In Proceedings of the IEEE ICNSC (Apr. 2008).Google Scholar
- Talevski, A., Chang, E., and Dillon, T. 2007. Secure and Mobile VoIP. In Proceedings of the ICCIT (Nov. 2007). Google ScholarDigital Library
- Kokkonen, E. and Matuszewski, M. 2008. Peer-to-Peer Security for Mobile Real-Time Communications with ZRTP. In Proceedings of the CCNC (Jan. 2008).Google Scholar
- Yang, Y., Feng, S., Ye, W., and Ji, X. 2008. A Transmission Scheme for Encrypted Speech over GSM Network. In Proceedings of the ISCSCT (Dec. 2008). Google ScholarDigital Library
Index Terms
- A highly effective model for security protection against eavesdropping exploits
Recommendations
A Framework of Cyber-Security Protection for Warship Systems
ISDEA '15: Proceedings of the 2015 Sixth International Conference on Intelligent Systems Design and Engineering ApplicationsWarship systems which belong to cyber-physical systems (CPSs) are facing severe cyber security challenges with the adoption of large amount of Information Technology. Security events happened in warship systems can cause serious consequences, such as ...
Stronger security model of group key agreement
ASIACCS '11: Proceedings of the 6th ACM Symposium on Information, Computer and Communications SecurityIn PKC 2009, Gorantla, Boyd and González Nieto presented a nice result on modelling security for group key agreement (GKA) protocols. They proposed a novel security model (GBG model) that better supports the adversaries' queries than previous models for ...
Security weaknesses of authenticated key agreement protocols
In this paper, we analyze the protocols of Tan, Lim et al., Chen et al. and five protocols of Holbl et al. After the analysis, we found that Tan et al.@?s, Lim et al.@?s and two protocols of Holbl et al. are insecure against the impersonation attack and ...
Comments