期刊文献+

端到端IP电话的安全保密系统设计与实现 被引量:2

Design and Implementation of Secure Privacy System in Point to Point IP Telephony
下载PDF
导出
摘要 介绍了一种端到端IP电话的语音加密方案.在分析IP电话存在安全问题的基础上,研究并解决了语音加解密和会话密钥安全协商问题,并实现了端到端IP电话的安全保密通信.测试结果表明,其时延、带宽占用和丢包率均达到了IP电话的QoS要求. This paper describes a design of ciphering voice in Point to Point IP Telephony, based on analyzing the problem of IP telephony security, the cipher voice and the arrange key are researched and solved, and security of point to point IP telephony is implemented . The results of test show that time delay, bandwidth comsumption and the lost probability of system can satisfy the demand of QoS.
出处 《河南师范大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第3期32-34,共3页 Journal of Henan Normal University(Natural Science Edition)
基金 河南省自然科学基金(0611052100)
关键词 IP电话 语音加密 密钥交换 IP telephone cipher voice key exchange
  • 相关文献

参考文献3

  • 1Butcher David, Li Xiangyang, Guo Jinhua, Security challenge and defense in VoIP infrastructures[C]//. IEEE Transactions on Systems. Man and Cybernetics Part C: Applications and Reviews. Piscataway N J, 2007: 1152-1162.
  • 2Anwar Zahid, Yurcik William. Multiple design patterns for Voice over IP (VoIP) security[C]//. Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference. Piscataway NJ,2006:485-492.
  • 3宋勇,李清宝,白燕.基于SIP协议的VoIP系统设计与实现[J].信息工程大学学报,2005,6(3):56-59. 被引量:5

二级参考文献4

  • 1DanielCollins著.VoIP技术与应用[M].北京人民邮电出版社,2003年6月..
  • 2J Rosenberg,H Schulzrinne,G Camarillo.IEF-RFC-3261 SIP:Session Initiation Protocol[DB/OL].http://www.ietf.org/rfc/rfc3261.txt?number=3261..
  • 3J Rosenberg,H Schulzrinne.IEF-RFC-3262.Reliability of Provisional Responses in the Session Initiation Protocol [DB/OL].http://www.ietf.org/rfc/rfc3262.txt?number=3262.
  • 4J Rosenberg,H Schulzrinne.IEF-RFC-3263.Session Initiation Protocol:Locating SIP Servers [DB/OL].http://www.ietf.org/rfc/rfc3263.txt?number=3263.

共引文献4

同被引文献23

  • 1崔红霞.IP网络中QoS机制的研究[J].网络安全技术与应用,2007(4):13-15. 被引量:1
  • 2IETF.The Secure Real-Time Transport Protocol(SRTP).[EB/OL].(2004-3-16)[2009-3-15].http:∥www.rfceditor.org/rfc/rfc3711.txt.
  • 3IEIF.RTP:A Transport Protocolfor Real-Time Applications[EB/OL].(2003-7-17)[2009-7-5].http:∥www.ietf.org/rfe/rfc3550.txt.
  • 4IETF.MIKEY:Multimedia Internet Keying[EB/OL].(2004-8-22)[2009-11-3].http:∥www.rfe-editor.org/rfc/rfc3830.txt.
  • 5ARRKO J,LINDHOLM F,NASLUND M,et al.Key Management Extensionsfor Session Description Protoeol(SDP)Andreal Time Streaming Protocol (RTSP)[EB/OL].(2006-7-20)[2009-7-5].http:∥www.ietf.org/rfc/ffc4567.txt.
  • 6ANDREASEN F,BAUGHER M,WING D.Session Description Protocol Security Descriptions for Media Streams,Work inPro-gress[EB/OL].(2006-7-20)[2009-7-5].http:∥www.ietf.org/rfc/rfc4568.txt.
  • 7THOMAS M,VILHUBER J.Kerberized Internet Negotiation of Keys (KINK)[EB/OL].(2001-10-20)[2009-7-5].http:∥www.ietf.org/proceedings/01dee/I-D/draft-ietf-kink-kink-02.txt.
  • 8IETF.The Group Domain of Interpretation[EB/OL].(2003-7-17)[2009-7-5].http:∥www.fie-editor.org/rfc/rfc3547.txt.
  • 9VOVIDA.Vovida Open Communication Application Library (VOCAL)[EB/OL].(2003-4-10)[2009-3-10].http:∥www.vovida.org/.
  • 10Nisar K, Hasbullah H, Said A M, et al. Internet Call Delay on Peer to Peer and Phone to Phone VoIP Network[C]. Computer Engi- neering and Technology ICCET 2009, Singapore, 2009.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部