Implementation of Encryption and Hash Function over SDP data in secured VoIP communication

Show simple item record

dc.contributor.author Hasan, Md. Saleem
dc.contributor.author Ahmed, Istiak
dc.date.accessioned 2021-10-12T04:15:40Z
dc.date.available 2021-10-12T04:15:40Z
dc.date.issued 2012-11-15
dc.identifier.citation [1] “VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures”, Diego Perez-Botero, Yezid Donoso, Second International Conference on Networking and Distributed Computing (ICNDC), 2011 , Beijing, September 2011, pages 192-196. [2] “Evaluation of VoIP media security for smartphones in the context of IMS”, Nakarmi, P.K. Mattsson, J. ; Maguire, G.Q., Communication Technologies Workshop (Swe-CTW), 2011 IEEE Swedish, Stockholm, October 2011, pages 123-128. [3] “VoIP secure session assistance and call monitoring via building security gateway” , * Jung-Shian Li*, * Chuan-Kai Kao, * Jau-Jan Tzeng, International Journal of Communication Systems, Volume 24, Issue 7, pages 837–851, July 2011 [4] “Unregister Attacks in SIP.”, Anat Bremler-Barr, Ronit Halachmi-Bekel, Jussi Kangasharju, 2006 2nd IEEE workshops on Secure Network Protocols, 2006. Pages 32-37. [5] “Implementation of Secure Hash Function over SDP.” A.F.M Sayem, Sheikh Mushtaq Ahmed, Md. Shihab Karim. [6] MiniSIP homepage, http://www.minisip.org/, last visited: April 2012. [7] “VoIP-Info.org-A reference guide to all VoIP things”, http://www.voip-info.org/ , last visited on April 2012. [8] http://computer.howstuffworks.com/ip-telephony.htm , last visited on April 2012. [9] http://rfc-ref.org/RFC-TEXTS/3830/index.html , last visited on April, 2012. [10] “RFC-3830, MIKEY:Multimedia Internet Keying” by J. Arkko , E. Carrara, F. Lindholm, M. Naslund, K. Norrman, August 2004. [11] http://watchguardsecuritycenter.com/tag/sip-registration-hijacking/ , last visited on July, 2012. [12] http://www.youdzone.com/signature.html, last visited July, 2012. [13] http://www.ouah.org/ogay/sha2 , last visited August, 2012. 40 [14] “Cryptography and Network Security” , by Behrouz A. Forouzan, published by The McGraw-Hill Company. [15] “SomaliREN 2 team, Opensips Installation & Configuration Manual – Version 1.0” [Online]. Available: http://vm199.xen.ssvl.kth.se/csdlive/sites/default/files/projects/Opensips%20Installation%20&%20Configuration%20Manual%20-%20Version%201.0.pdf; Last viewed September 12, 2012. en_US
dc.identifier.uri http://hdl.handle.net/123456789/1164
dc.description Supervised by Abdullah Azfa, Assistant Professor, Co Supervisor, Mahmudun Nabi, Lecturer, Computer Science and Engineering (CSE), Islamic University of Technology (IUT), Board Bazar, Gazipur-1704. Bangladesh. en_US
dc.description.abstract One of the most demanding aspects of the Internet now is voice communication. It can be achieved through Voice over Internet Protocol (VoIP). Although the data communication over VoIP is very reliable and secure, some of its underlying protocols are not. An example is the Session Initiation Protocol (SIP) and its underlying Session Description Protocol (SDP) which are responsible for establishing voice calls and describing the multimedia session respectively. Session Initiation Protocol (SIP) is a signaling protocol which creates a unicast and multicast session between communicating parties. This protocol does not enforce any security parameters. It uses the Session Description Protocol (SDP) to announce the session profile. The body of the SDP message is written in plaintext. Hence this exchange of information between the communicating devices is insecure and can easily be intercepted and exploited by a third party. To remedy this problem we intend in this work to create a hash of the data contained in the SDP body to ensuring data integrity. Furthermore, we intend to encrypt the information using Symmetric Key Encipherment to ensure that only the receiver can decrypt the message and implement Digital Signature to authenticate the sender. en_US
dc.language.iso en en_US
dc.publisher Department of Computer Science and Engineering (CSE), Islamic University of Technology (IUT), Board Bazar, Gazipur-1704, Bangladesh en_US
dc.title Implementation of Encryption and Hash Function over SDP data in secured VoIP communication en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IUT Repository


Advanced Search

Browse

My Account

Statistics