Browse > Article

Design of Internet Phon(VoIP) System for Voice Security based on VPN  

Kim Suk-Hun (한남대학교 컴퓨터공학과)
Kim Eun-Soo (한남대학교 교수학습지원센터)
Song Jung-Gil (한남대학교 컴퓨터공학과)
Abstract
The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.
Keywords
VoIP; VPN; PSTN; PPTP; SIP;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Rand, 'The PPP Compression Control Protocol (CCP)', RFC 1962, June 1996
2 G. McGregor, 'The PPP Internet Protocol Control Protocol (IPCP)', RFC 1332, May 1992
3 W. Simpson, 'PPP LCP Extensions', RFC 1548, January 1994
4 W. Simpson, 'PPP Challenge Handshake Authentication Protocol (CHAP)', RFC 1994, August 1996
5 K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, G. Zorn, 'Point-to-Point Tunneling Protocol (PPTP)', RFC 2637, July 1999
6 W. Simpson, 'The Point-to-Point Protocol (PPP)', RFC 1661, July 1994
7 Li C, Li S, Zhang D, Chen G, 'Cryptanalysis of a data security protection scheme for VoIP', IEE Proceedings Vision, Vol. 153, No. 01, pp. 1-10, 2006.2   DOI   ScienceOn
8 Steven M. Bellovin, Susan Landau, Matt Bla, 'The real national-security needs for VoIP', Communications of the ACM, Vol. 48 No. 11 pp. 120-120,2005.11   DOI   ScienceOn
9 J. Postel, 'Internet Protocol', RFC 760, January 1980
10 G. Pall, G. Zorn, 'Microsoft Point-To-Point Encryption (MPPE) Protocol', RFC 3078, March 2001