Reinforcement of VoIP Security with Multipath Routing and Secret Sharing Scheme

A technique to enhance the security of vocal communication over an open network is proposed in this paper. This technique combines a secret sharing scheme and a multipath routing technique on network communication. The secret sharing scheme, originally proposed to convey information securely from one person to another, divides original information into sets of partial data. Each set of partial data is designated as shared data. In principle, nobody can obtain any information of the original from a subset of the shared data. Only a person who collects all shared data can reconstruct the original information. Furthermore, a multipath routing technique, by which a single set of data is transferred from one host to another through multiple network paths, was developed originally for load sharing and high reliability. The proposed method therefore divides speech data using the secret sharing scheme and transfers the shared data using the multipath routing technique to realize secure voice communication over the network. Advantages of the method are that it requires no secret key, which plays an essential role in IPsec, and moreover, it can be used in conjunction with IPsec to reinforce the security of VoIP.

[1]  Juan Carlos De Martin,et al.  Perception-based selective encryption of G.729 speech , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[2]  Chang-Chou Lin,et al.  Secret image sharing with capability of share data reduction , 2003 .

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[5]  Yuguang Fang,et al.  A multipath routing approach for secure data delivery , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[6]  Richard D. Gitlin,et al.  Diversity coding for transparent self-healing and fault-tolerant communication networks , 1993, IEEE Trans. Commun..

[7]  Hari Balakrishnan,et al.  Resilient overlay networks , 2001, SOSP.

[8]  S. Hayashi,et al.  Design and description of CS-ACELP: a toll quality 8 kb/s speech coder , 1998, IEEE Trans. Speech Audio Process..

[9]  Jinhua Guo,et al.  Security Challenge and Defense in VoIP Infrastructures , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[10]  Sung-Ju Lee,et al.  Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[11]  Deepinder P. Sidhu,et al.  Finding disjoint paths in networks , 1991, SIGCOMM '91.

[12]  J.D. Gibson,et al.  Selective encryption and scalable speech coding for voice communications over multi-hop wireless links , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..

[13]  Akitoshi Kataoka,et al.  A cryptic encoding method for G.729 using variation in bit‐reversal sensitivity , 2007 .

[14]  Juan Carlos De Martin,et al.  Perception-based partial encryption of compressed speech , 2002, IEEE Trans. Speech Audio Process..

[15]  Ali C. Begen,et al.  Multi-path selection for multiple description encoded video streaming , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[16]  Danilo Bruschi,et al.  Voice over IPsec: analysis and solutions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[17]  A. Wyner,et al.  Source coding for multiple descriptions , 1980, The Bell System Technical Journal.

[18]  Nachum Shacham,et al.  Distributed algorithms for computing shortest pairs of disjoint paths , 1993, IEEE Trans. Inf. Theory.

[19]  Yao Wang,et al.  Multiple Description Coding for Video Delivery , 2005, Proceedings of the IEEE.

[20]  Zygmunt J. Haas,et al.  Multipath routing in the presence of frequent topological changes , 2001, IEEE Commun. Mag..

[21]  Alan B. Johnston,et al.  Understanding Voice over Ip Security (Artech House Telecommunications Library) , 2006 .

[22]  Dhananjay S. Phatak,et al.  A novel mechanism for data streaming across multiple IP links for improving throughput and reliability in mobile environments , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[23]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[24]  Chi-keung Julian Wong Coding of speech at 16 kbit/s using low-delay code excited linear prediction (LD-CELP) , 2010 .