A NEW SECURED VoIP USING HIERARCHICAL THRESHOLD SECRET SHARING
نویسندگان
چکیده
Voice over Internet Protocol is a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions of the PSTN. The transmission of real time voice data is not as easy as ordinary text data and the real time voice transmission faces lot of difficulties. It suffers from packet loss, delay, quality and security. One prominent advantage of VoIP is that the telephone calls over the Internet do not incur a surcharge beyond what the user is paying for Internet access, much in the same way that the user doesn't pay for sending individual messages over the Internet. VoIP provides a protected transmission of private voice data between two endpoints. In those settings in VoIP, the participants between secret sharing scheme into a variety of levels. The hierarchical secret sharing is one of the best schemes in VoIP because it is more easy and simple to compute and implement in the real-life. An analysis of the signaling process and a study of simulation results have shown the advanced security enhancements in VoIP.
منابع مشابه
A NEW SECURED VoIP USING VERIFIABLE SECRET SHARING
Voice communication carried out using the Internet Protocol (IP) for the transaction is known as Voice over Internet Protocol (VoIP). Voice over Internet Protocol is a technology for communicating using Internet protocol instead of traditional analog systems. Some VoIP services need only a regular phone connection, while others allows making telephone calls using an Internet connection instea...
متن کاملA SECURITY ANALYSIS IN VoIP USING HIERARCHICAL THRESHOLD SECRET SHARING
-------------------------------------------------------------------ABSTRACT---------------------------------------------------Voice over Internet Protocol (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. VoIP provides a protected transmission of private voice data betwee...
متن کاملAn Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملHierarchical Group Key Management using Threshold Cryptography in Wireless Sensor Networks
In wireless sensor networks (WSNs), data transmission is secured by authenticating secret keys. Secure key management is most important for network reliability and consistency. In this paper, a hierarchical group key management technique using threshold cryptography in Wireless Sensor Networks is proposed. The technique considers hierarchical sensor network, where sensing nodes are coordinated ...
متن کاملA New Group-based Secret Function Sharing with Variate Threshold
Secret sharing is a cryptographic scheme that divides a secret key s to n participants with threshold t. Thus, assuring that no less than t shares can reconstruct the secret. The application of secret sharing also widens not only one group but several hierarchical structure. However, the group-based secret sharing proposed by Liu et al. in 2014 has some drawbacks, which are having an equal thre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015