Font Size: a A A

Research Of Authentication And Privacy For P2P VoIP

Posted on:2011-05-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y X JiaFull Text:PDF
GTID:2178360302991172Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapid development of internet technology, VoIP will be widely used. By using P2P technology, P2P VoIP solves the "performance bottlenecks" and "single point of failure" problems for traditional C/S structure VoIP. By combining P2P technology and SIP protocol, P2PSIP signaling standard is being developed by IETF. For openness of IP networks, coupled with high degree autonomy of P2P network nodes, message interception and modification are very easy for enymies, research of P2P VoIP communication security problems is really important.This paper comes from national "115" project, the main contributions are as follows:(1) Security threats faced by P2P VoIP are analyzed for signaling protocol and media stream security, security policies are proposed.(2) For signaling protocol security, identity-based P2PSIP mutual authentication scheme and authentication key agreement scheme are proposed, mutual authentication and session key establishment are achieved between P2P nodes, a secure P2P VoIP communication scheme is also proposed.(3) For media stream security, a P2P VoIP terminal encryption engine design scheme is proposed based on high-speed DSP processor, hardware platform is designed, software optimization are analyzed. Taking the processor speed (MIPS) and encryption speed as indicators, the system is more efficient than other systems.
Keywords/Search Tags:P2P VoIP, Mutual authentication, Authentication Key Agreement, Encryption engine
PDF Full Text Request
Related items