Unsolicited emails, more commonly known as spam, have plagued the use and efficiency of ema il since its inception. With the introduction of ungoverned cheap voice communications, such as IP telephony, spam over telephony (SPIT) and its prevention is set to dominate and dri ve whether the technology is widely adopted or not. A possible example of voice spam schemes includes the use of I nteractive Voice Response (IVR) systems in conjunct ion with automated telemarketing sales to repeatedly initiat e call setups and fill voicemail boxes. The problem faced is to design a system that allows legitimate voice call establishm ent while anonymously blocking unwelcome ones. An a nonymous approach prevents voice spam by prohibiting spammer s from establishing call and do not call lists. In this paper we propose a new model as an extensio n to a call signalling phase (or call setup phase) as a means to prevent unwanted voice spam. In doing so we define a IP telephony “call me back” scheme using an Anony mous Verifying Authority (AVA) and Mediator in blocking unsolicited voice calls. We illustrate the use of a“call me back” request in allowing the callee to accept or reject the call. Verification may be based on the callee’s personal call policy thus filtering unsolicited voice spam.
[1]
David Chaum,et al.
Untraceable electronic mail, return addresses, and digital pseudonyms
,
1981,
CACM.
[2]
Roy T. Fielding,et al.
Uniform Resource Identifiers (URI): Generic Syntax
,
1998,
RFC.
[3]
Michael K. Reiter,et al.
Anonymous Web transactions with Crowds
,
1999,
CACM.
[4]
Ralf Steinmetz,et al.
Vulnerabilities and Security Limitations of current IP Telephony Systems
,
2001,
Communications and Multimedia Security.
[5]
Jon Peterson,et al.
A Privacy Mechanism for the Session Initiation Protocol (SIP)
,
2002,
RFC.
[6]
Jon Peterson,et al.
Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP)
,
2006,
RFC.
[7]
Mark Handley,et al.
SDP: Session Description Protocol
,
1998,
RFC.