skip to main content
10.1145/1655925.1656087acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicisConference Proceedingsconference-collections
research-article

A highly effective model for security protection against eavesdropping exploits

Published:24 November 2009Publication History

ABSTRACT

In this paper, a security model is proposed to protect against eavesdropping threats over digital communications. The model is simple to implement with personalized security, but highly effective with a better level of confidentiality performance in operations. There are two stages of protection development. At first, any communicating parties could set up their own common encryption keys with Diffie-Hellman key-exchange protocol, followed by simple encryption rules so-called M:N ratio being notified prior to the start of conversation. By this technique, it is rather difficult for eavesdroppers to discover voice conversation if not totally impossible. The experimental results show that the system could perform its function accurately as designed. In this regard, the proposed system could be further extended and fully implemented for eavesdropping protection over digital networks, without any requirements to modify for changes in presently existing network systems at all.

References

  1. ITU-T G.107. The E-Model, a Computational Model for Use in Transmission Planning. (Mar. 2005).Google ScholarGoogle Scholar
  2. Markopoulou, A. P., Tobagi, F. A., and Karam, M. J. 2002. Assessment of VoIP Quality over Internet Backbones. In Proceedings of the IEEE INFOCOM (Jun. 2002).Google ScholarGoogle Scholar
  3. ITU-T G.113. Transmission Impairments due to Speech Processing. (Feb. 2001).Google ScholarGoogle Scholar
  4. ITU-T G.113 Appendix I. Appendix I: Provisional Planning Values for the Equipment Impairment Factor Ie and Packet-Loss Robustness Factor Bpl, (May 2002).Google ScholarGoogle Scholar
  5. Rekha, A. B., Umadevi, B., Solanke, Y., and Kolli, S. R. 2005. End-to-End Security for GSM Users. In Proceedings of the IEEE ICPWC (Jan. 2005).Google ScholarGoogle Scholar
  6. Tangwongsan, S. and Kassuvan, S. 2007. A Security Model of Voice Eavesdropping Protection over Digital Networks. In Proceedings of WASET (Apr. 2007).Google ScholarGoogle Scholar
  7. Tangwongsan, S. and Kassuvan, S. 2008. A Security Model of Multiparty Conference with Eavesdropping Protection over Digital Networks. In Proceedings of the IEEE ICCT (Nov. 2008).Google ScholarGoogle Scholar
  8. Qi, H. F., Yang, X. H., Jiang, R., Liang, B., and Zhou, S. J. 2008. Novel End-to-End Voice Encryption Method in GSM System. In Proceedings of the IEEE ICNSC (Apr. 2008).Google ScholarGoogle Scholar
  9. Talevski, A., Chang, E., and Dillon, T. 2007. Secure and Mobile VoIP. In Proceedings of the ICCIT (Nov. 2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kokkonen, E. and Matuszewski, M. 2008. Peer-to-Peer Security for Mobile Real-Time Communications with ZRTP. In Proceedings of the CCNC (Jan. 2008).Google ScholarGoogle Scholar
  11. Yang, Y., Feng, S., Ye, W., and Ji, X. 2008. A Transmission Scheme for Encrypted Speech over GSM Network. In Proceedings of the ISCSCT (Dec. 2008). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A highly effective model for security protection against eavesdropping exploits

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
              November 2009
              1479 pages
              ISBN:9781605587103
              DOI:10.1145/1655925

              Copyright © 2009 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 24 November 2009

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader