Font Size: a A A

The Rearch And Implement Of The Safety Voice Gateway

Posted on:2010-03-14Degree:MasterType:Thesis
Country:ChinaCandidate:P ZhouFull Text:PDF
GTID:2178330332462387Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As a kind of signaling control protocol working in application-layer, SIP can be used to build, modify, and terminate the conversational over IP network multimedia, however, due to the IP network of openness, the hidden danger of data security and the inherent characteristics of SIP protocol itself, as a result the text of the agreement can easily be illegal users to steal, so the process of signaling network can be controled. In order to guarantee the safety of information transmission, and prevent transmission of the data is be destroyed, we must adopt a certain security mechanism to guarantee.Based on the study and analysis of the voice gateway security mechanism, this paper realizes a kind of session security mechanism by encryption and decryption the data from physical layer. By the security mechanism, designing and realizing the security communication module. Compared to the traditional security mechanism, this module can encrypted and decrypted all data of input and output devices , especially it can be used as a processor separately, thus improving the system of speed. Another all the operations can be complished in a chip, this can make the system design in the modular. Through the test of the security module in the network environment, the results show that the security module can keep a security channel both sides of the conversation in the process always keep a conversation. The voice data, text data and key data are encrypted in transmission is encrypted, so make sure the transmission of data in the confidentiality and integrity. Therefore, this security voice gateway can guarantee the data are not illegal use in the network calls, proved the validity and practicability of the module.
Keywords/Search Tags:SIP protocal, Embedded Linux, Security Mechanism, Encryption, Identity Authentication
PDF Full Text Request
Related items