DocumentCode
237929
Title
Dynamic ECDH mechanism for enhancing privacy of voice calls on mobile phones over VoIP server
Author
Ashok, S. ; Arjun, A. ; Subashri, T.
Author_Institution
Dept. of Electron. Eng., Anna Univ., Chennai, India
fYear
2014
fDate
8-10 May 2014
Firstpage
1179
Lastpage
1184
Abstract
VoIP networks are prone to confidentiality threats due to weak keys used by the AES algorithm for encryption of VoIP packets. So, in order to strengthen the key for encryption and decryption, Elliptic Curve Diffie-Hellman (ECDH) Algorithm key agreement scheme is employed with smaller key sizes resulting in faster computations. This Paper presents the Design and Implementation of an Asterisk VoIP server which serves as an exchange for placing voice calls in private Wi-Fi cloud and legacy networks. Voice over internet protocol refers to the transmission of speech across networks. The elliptic curve used in this paper is a modified NIST P-256 curve. The key generated by ECDH is highly secure because the discrete logarithmic problem is very difficult to crack in this scheme. This Method is successfully carried out for voice calls on supported handhelds connected with the wireless network. Further, every user is provided with his/her own extension number that can be used to connect to and from the outside world. This ECDH key exchanging mechanism for voice calls in real time is implemented using Asterisk PBX (Private Branch eXchange), which is an open source software.
Keywords
Internet telephony; computer network security; mobile handsets; private telephone exchanges; public key cryptography; radio networks; voice communication; wireless LAN; AES algorithm; Asterisk PBX; Asterisk VoIP server Implementation; NIST P-256 curve; VoIP packet encryption; Wi-Fi cloud; decryption; discrete logarithmic problem; dynamic ECDH mechanism; elliptic curve Diffie-Hellman algorithm key agreement scheme; legacy network; mobile phone; open source software; private branch exchange; speech transmission; voice call privacy enhancement; voice over Internet protocol; wireless network; DH-HEMTs; Encryption; Generators; IEEE 802.11 Standards; Lead; Servers; Asterisk PBX; Dynamic ECDH; IAX; Key exchange; SIP; Softphone; VoIP; wireless communications;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on
Conference_Location
Ramanathapuram
Print_ISBN
978-1-4799-3913-8
Type
conf
DOI
10.1109/ICACCCT.2014.7019284
Filename
7019284
Link To Document