Title :
Beyond steganography for Voice Over IP (VOIP)
Author :
Maher, Ahmed ; Hegazy, A.F. ; Hasan, Bahaa ; Hashim, Mohamed
Author_Institution :
Dept. of Comput. Sci., Arab Acad. for Sci. & Technol., Cairo, Egypt
fDate :
Nov. 30 2010-Dec. 2 2010
Abstract :
The functional and cost advantages of Internet telephony are evident. By today´s technical standards, however, Voice Over IP (VOIP) is still less secure than traditional telephony. At the same time, the hacker scene is constantly looking for new weak spots and developing ingenious methods of attack to gain access to confidential information and penetrate further into the network. One of the most security issues faced by VOIP is end-to-end user identity, specially the responder identity and how to authenticate it. This is important specially to guarantee the privacy and the integrity of the response information. In this paper we will introduce some security issues about VOIP, the role of steganography in VOIP communication, and OTSIP which is a proposed mechanism to secure VOIP based on steganography and One Time Password.
Keywords :
Internet telephony; computer crime; data privacy; message authentication; steganography; Internet telephony; OTSIP; end-to-end user identity; hacker scene; one time password; privacy; responder identity authentication; security issue; steganography; voice over IP; Authentication; IP networks; Internet telephony; Protocols; Servers; Unsolicited electronic mail; One Time Password (OTP); One Time Signature (OTS); Response Identity; Steganography; VOIP Security;
Conference_Titel :
Computer Engineering and Systems (ICCES), 2010 International Conference on
Conference_Location :
Cairo
Print_ISBN :
978-1-4244-7040-2
DOI :
10.1109/ICCES.2010.5674899