Vtalk: Secure Deployment of VoIP over LAN’S

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 Peer-to-peer VoIP (voice over IP) networks, exemplified by Skype, are becoming increasingly popular due to their significant cost advantage and richer call forwarding features than traditional public switched telephone networks. One of the most important features of a VoIP network is privacy (for VoIP clients). Unfortunately, most peer-to-peer VoIP networks neither provide personalization nor guarantee a quantifiable privacy level. In this paper, we propose novel flow analysis attacks that demonstrate the vulnerabilities of peer-to-peer VoIP networks to privacy attacks. We then address two important challenges in designing privacy-aware VoIP networks: Can we provide personalized privacy guarantees for VoIP clients that allow them to select privacy requirements on a per-call basis? How to design VoIP protocols to support customizable privacy guarantee? This paper proposes practical solutions to address these challenges using a quantifiable k-anonymity metric and a privacy-aware VoIP route setup and route maintenance protocols. We present detailed experimental evaluation that demonstrates the performance and scalability of our protocol, while meeting customizable privacy guarantees.

Authors and Affiliations

Ms. Sassirekha. S. M

Keywords

Related Articles

Survey and Comparative Study on Resource Allocation Strategies in Cloud Computing Environment

Cloud computing is an essential ingredient of modern computing systemsCloud computing provides an on demand service because it offers dynamic resource allocation for reliable and highly available services in pay as-you-c...

 A review of High Performance Computing

 Current high performance computing (HPC) applications are found in many consumers, industrial and research fields. There is a great deal more to remote sensing data than meets the eye, and extracting that inform...

 Prevention of Selective Jamming Attacks by Using Packet Hiding  Methods

 The open nature of the wireless medium leaves it too weak to intentional interference attacks, typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch &nbs...

An Efficient Methodology for Clustering Uncertain Data Based on Similarity Measure

Abstract: In data mining clustering is one of the most important and crucial task. There exists various clustering techniques like partitioning and density based techniques. The previous methods worked on traditional par...

 Techniques for the Detection of Blood Vessels in DiabeticRetinopathy

Abstract: Identification of blood vessels in medical images plays a vital role in explaining many practicalapplications pertaining to the diagnosis of the blood vessels. Vessel segmentation algorithms are the importantel...

Download PDF file
  • EP ID EP104717
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

Ms. Sassirekha. S. M (2014).  Vtalk: Secure Deployment of VoIP over LAN’S. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 26-28. https://europub.co.uk/articles/-A-104717