Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30472
A Security Model of Voice Eavesdropping Protection over Digital Networks

Authors: Supachai Tangwongsan, Sathaporn Kassuvan

Abstract:

The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.

Keywords: Computer Security, Encryption, key exchange, security model, Voice Eavesdropping

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1058753

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1266

References:


[1] A. Servetti, J. C. De Martin, Perception-Based Partial Encryption of Compressed Speech. IEEE Transactions on Speech and Audio Processing, Vol. 10, No. 8, November 2002.
[2] ITU-T G.729. Coding of Speech at 8 kbit/s Using Conjugate-Structure Algebraic-Code-Excited Linear-Prediction (CS-ACELP), March 1996.
[3] J.-I. Guo, J.-C. Yen, H.-F. Pai, New Voice over Internet Protocol Technique with Hierarchical Data Security Protection. IEE Proceedings-Vision, Image and Signal Processing, Vol. 149, No. 4, August 2002.
[4] M. Baugher, et al, The Secure Real-time Transport Protocol (SRTP). IETF, RFC 3711, March 2004.
[5] R. Blom, E. Carrara, F. Lindholm, K. Norrman, M. Näslund, Conversational IP Multimedia Security. IEEE Mobile and Wireless Communications Network, 2002.
[6] A. Mehrotra, L. S. Golding, Mobility and Security Management in the GSM System and Some Proposed Future Improvements. Proceedings of the IEEE, Vol. 86, No. 7, July 1998.
[7] Security Related Network Functions (Release 6), 3GPP TS 43.020 V6.1.0, December 2004.
[8] A. B. Rekha, B. Umadevi, Y. Solanke, S. R. Kolli, End-to-End Security for GSM Users. IEEE ICPWC 2005.
[9] ITU-T G.723.1. Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 kbit/s, March 1996.
[10] ITU-T G.107. The E-Model, a Computational Model for Use in Transmission Planning, March 2005.
[11] A. P. Markopoulou, F. A. Tobagi, M. J. Karam, Assessment of VoIP Quality over Internet Backbones. IEEE INFOCOM, 2002.
[12] ITU-T G.113. Transmission Impairments due to Speech Processing, February 2001.
[13] ITU-T G.113 Appendix I. Appendix I: Provisional Planning Values for the Equipment Impairment Factor Ie and Packet-Loss Robustness Factor Bpl, May 2002.
[14] ITU-T G.726. 40, 32, 24, 16 kbit/s Adaptive Differential Pulse Code Modulation (ADPCM), December 1990.
[15] Adaptive Multi-Rate (AMR) Speech Codec Transcoding Functions (Release 6), 3GPP TS 26.090 V6.0.0, December 2004.