Logo
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • English 
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Login
View Item 
  •   University of Thessaly Institutional Repository
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • View Item
  •   University of Thessaly Institutional Repository
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
Institutional repository
All of DSpace
  • Communities & Collections
  • By Issue Date
  • Authors
  • Titles
  • Subjects

Voice interactive personalized security (VoIPSEC) protocol: Fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification

Thumbnail
Author
Kopsidas, S.; Zisiadis, D.; Tassiulas, L.
Date
2006
DOI
10.1109/HOTWEB.2006.355266
Keyword
Biometric security
Cryptography
Intrusion detection
Key exchange
Privacy
Voice communication
Biometrics
Computer systems
Internet protocols
Internet telephony
Lighting
Metropolitan area networks
Public key cryptography
Quality assurance
Reliability
Security of data
Technology
Telecommunication
Telecommunication networks
Telephone sets
Telephone systems
World Wide Web
Attack methods
Biometric based authentication
Biometric evidence
Biometric verification
Electronic communications
End-to-end communications
End-to-end security
Human voice
Information exchanging
Key exchanges
Light weighting
Man in the middle attacks
Minimal resources
Network resources
Novel methods
Public key
Public keys
Public-key infrastructure
Public-key infrastructures
Secret keys
Security approach
Security architectures
Session keys
Trusted authority
Web systems
Communication
Metadata display
Abstract
Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack methods that compromise them, while people suspect others, even more sophisticated attack methods never see the daylight. In the present work we propose a novel method for secure end-to-end communication based on biometric evidence to ensure security and integrity of the information exchanged. The traditional approach for securing the communication between two peers is through the use of secret key encryption combined with a public key approach for exchanging the common secret key to be used by the end peers. The public key part of the communication is based on a trusted authority for providing the public keys, a service provided through a Public Key Infrastructure (PKI). Public key infrastructures are vulnerable to man in the middle attacks, among other approaches that compromise their integrity. There has been a lot of work for providing robust PKI infrastructures, the proposed solutions are fairly demanding on network resources, hence public key solutions are not the security approach of choice in several applications that require light weight solutions. Here we propose an approach for providing secure end-to-end communications in environments where it is possible to have biometric based authentication, exploiting the nature of the application; voice communication being the typical example that we use as our paradigm for describing the method. During the establishment of the communication session, the end-peers exchange a challenge/signature token, the integrity of which is confirmed vocally when the voice communication initiates. The security of the method relies on the inability to mechanically impersonate an individual both because of the biometric user specific attributes of the human voice and video as well as the user customized profile of the exchanged information. The method is appropriate for ensuring the security of an encrypted phone conversation, guaranteeing the integrity of the session key exchanged in the beginning of the conversation. It requires minimal resources from the user handsets and no additional support from the network, so it is inherently scalable and readily deployable as it only needs an appropriately enhanced secure handset. ©2006 IEEE.
URI
http://hdl.handle.net/11615/29618
Collections
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ. [19735]

Related items

Showing items related by title, author, creator and subject.

  • Thumbnail

    Continuous and secure monitoring of biometric sensors in distributed environments 

    Kampouris, Theodoros (2011)
    The main goal of this thesis is to implement a continuous and secure monitoring of biometric sensors in distributed environments and also to help in understand the use of biometrics, the authentication methods used, the ...
  • Thumbnail

    The importance of biometric sensor continuous secure monitoring 

    Papanikolaou, A.; Georgiadis, G.; Ilioudis, C.; Pimenidis, E. (2008)
    The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring that the ...
  • Thumbnail

    Voice interactive personalized security protocol: Definition and security analysis 

    Zisiadis, D.; Kopsidas, S.; Tassiulas, L. (2007)
    Security is a major issue in VoIP communications over the Internet, especially in mobile environments. Voice Interactive Personalized Security (VIPSec) constitutes a method for leveraging the security for Internet ...
htmlmap 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister (MyDspace)
Help Contact
DepositionAboutHelpContact Us
Choose LanguageAll of DSpace
EnglishΕλληνικά
htmlmap