The VoIP-based Internet Phonesystem is now seen as one of the killer applications in the high speed and broadband internet environment. Given the wide-spread use of the Internet Phone, it is necessary to provide security services for guaranteeing users' privacy. However, providing security service in Internet Phone has the possibility of incurring additional overheads such as call setup delay time. In this paper, we present a one-way key agreement model based on VoIP in order to reduce call setup time as well as protecting user privacy. The proposed approach decreases the delay time of the call setup in comparison with the previous models because our model enables the key generation in caller side without waiting the response from the receiver.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Kyusuk HAN, Taeshik SHON, Kwangjo KIM, "Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security" in IEICE TRANSACTIONS on Communications,
vol. E94-B, no. 8, pp. 2235-2238, August 2011, doi: 10.1587/transcom.E94.B.2235.
Abstract: The VoIP-based Internet Phonesystem is now seen as one of the killer applications in the high speed and broadband internet environment. Given the wide-spread use of the Internet Phone, it is necessary to provide security services for guaranteeing users' privacy. However, providing security service in Internet Phone has the possibility of incurring additional overheads such as call setup delay time. In this paper, we present a one-way key agreement model based on VoIP in order to reduce call setup time as well as protecting user privacy. The proposed approach decreases the delay time of the call setup in comparison with the previous models because our model enables the key generation in caller side without waiting the response from the receiver.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E94.B.2235/_p
Copy
@ARTICLE{e94-b_8_2235,
author={Kyusuk HAN, Taeshik SHON, Kwangjo KIM, },
journal={IEICE TRANSACTIONS on Communications},
title={Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security},
year={2011},
volume={E94-B},
number={8},
pages={2235-2238},
abstract={The VoIP-based Internet Phonesystem is now seen as one of the killer applications in the high speed and broadband internet environment. Given the wide-spread use of the Internet Phone, it is necessary to provide security services for guaranteeing users' privacy. However, providing security service in Internet Phone has the possibility of incurring additional overheads such as call setup delay time. In this paper, we present a one-way key agreement model based on VoIP in order to reduce call setup time as well as protecting user privacy. The proposed approach decreases the delay time of the call setup in comparison with the previous models because our model enables the key generation in caller side without waiting the response from the receiver.},
keywords={},
doi={10.1587/transcom.E94.B.2235},
ISSN={1745-1345},
month={August},}
Copy
TY - JOUR
TI - Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security
T2 - IEICE TRANSACTIONS on Communications
SP - 2235
EP - 2238
AU - Kyusuk HAN
AU - Taeshik SHON
AU - Kwangjo KIM
PY - 2011
DO - 10.1587/transcom.E94.B.2235
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E94-B
IS - 8
JA - IEICE TRANSACTIONS on Communications
Y1 - August 2011
AB - The VoIP-based Internet Phonesystem is now seen as one of the killer applications in the high speed and broadband internet environment. Given the wide-spread use of the Internet Phone, it is necessary to provide security services for guaranteeing users' privacy. However, providing security service in Internet Phone has the possibility of incurring additional overheads such as call setup delay time. In this paper, we present a one-way key agreement model based on VoIP in order to reduce call setup time as well as protecting user privacy. The proposed approach decreases the delay time of the call setup in comparison with the previous models because our model enables the key generation in caller side without waiting the response from the receiver.
ER -