[vc_empty_space][vc_empty_space]
Development of key exchange protocol to enhance security of voice over internet protocol on mobile phone
Bandung Y.a, Putra A.P.a
a School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, Indonesia
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2017, School of Electrical Engineering and Informatics. All rights reserved.A system of securing voice communication on mobile phone based on peer-to-peer SIP protocol (P2PSIP) is discussed in this paper. This paper presents a new key exchange protocol for secure Voice over Internet Protocol (VoIP) communication on mobile phones with P2PSIP. In this paper, security threats and issues in VoIP are analyzed. In our approach, we combine key exchange protocol based on the Elliptic Curve Diffie Hellman (ECDH) public key cryptography with identity based user’s authentication, beside we use existent text message to exchange user information (identity, IP Address, and Port). The key exchange protocol is proposed to assure confidentiality and integrity of voice communication on mobile phone. We conducted security analysis between the proposed protocol with the existing ECDH protocol and compared their performance of key generating and key exchange time. The proposed method was validated by Scyther tool for proofing the proposed key exchange protocol. The experiment results showed that the combination of ECDH and authentication mechanism has proved to be secure against attacks. With the addition of the authentication scheme, total execution time of generate key and exchange key is slower by 11.70% than those of the original ECDH. Although the execution time run more slowly, we can guarantee that the VoIP communications still can be performed interactively without impairments because the key exchange process is carried out before communication between two peers begins. We conducted the confidentiality and integrity examination using Wireshark and Mean Opinion Score (MOS). Results of the Wireshark tool show that the VoIP communication is secure againts attacks. From the MOS measurements we obtained score 3.6 which means we achieve good quality and integrity of VoIP communication.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]ECDH,Key Exchange Protocol,P2PSIP,Scyther Tool,VoIP Security[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.15676/ijeei.2017.9.1.12[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]