Privacy Sanitization In Data Transmission
Keywords:
VoIP, Speech Recognition, HMM, RTP, Si lence SuppressionAbstract
Voice over Internet Protocol (VoIP) is a technology that enables one to make and receive calls through the Internet instead of using the traditional analog PSTN (Public Switched Telephone Network) lines. Although, VoIP is widely used technology but VoIP calls may also bring security problems such as cyber crime issues. To solve the security problems the contents of a VoIPsession should be encrypted. Thispaper focuseson authenticationissues anduser ID detection as Security is an essential part of human life depending on the voice signature of the incoming VoIP calls. Our approach defines the speech communication over the internet by detecting adversary to avoid eavesdropping. HMM )Hidden Markov Model( is used to recognize the speaker on the basis of extracted features. For this it first train the voice sample into wave file. And then, to detect the speakers of encrypted speech communications, we are proposing a new way of traffic attacks using RTP (Realtime Transport Protocol). The proposed traffic attacksarebasedonpackettiming informationonly. Thispaper shows that the proposed traffic analysis attacks can detect speakers of encrypted speech communications with high detection rates based on speech communication traces. While transmitting voice over network naive tracing technique support for alternate network to increase sanitization.
References
]1[ Ye Zhu, Yuanchao Lu, and Anil Vikram, “On Privacy of Encrypted Speech Communication” IEEE transaction on dependable and secure computing. July 2012. ]2[ A. Srinivasan, “Speech Recognition Using Hidden
Markov Model” Applied Mathmatical science, 2011. [3] Xuan wang, Jiancheng Lin, “Applying Speaker Recognition on VoIp Auditing” Proc. Sixth Int'l Conf., on Machine Learning and Cybernetics, August 2007. ]4[ Abdelkader Lahmadi, Olivier Festor, “A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services” IEEE Transactions on network and service management, June 2012.
]5[ R. Rabiner, “A tutorial on Hidden Markov model and selected applications in Speech recognition” proc. IEEE, Feb.1989.
]6[ Kaustubh Lohiya, Narendra Shekokar, Satish R. Devane, “End to End Encryption Architecture for Voice over Internet Protocol” Int'l Journal Computer Application, March 2012.
]7[ P. Zimmermann, A. Johnston, and J. Callas, “Zrtp: Media PathKey Agreement for Secure rtp Draft Zimmermann-Avt-Zrtp-11,” RFC, United States, 2008.
]8[ M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman, “The Secure Real-Time Transport Protocol (srtp),” 2004.
]9[ Ibrahim Patel. Dr. Y. Srinivas Rao, “Speech Recognition Using HMM With MFCC” Signal & Image Processing, Int'l Journal (SIPIJ), December 2010.
B.N. Levine, M.K. Reiter, C. Wang, and M.K. Wright, “Timing Attacks in Low-Latency Mix-Based Systems,” Proc. Eighth Int'l Financial Cryptography (FC '04) Conf., pp. 251-265, Feb. 2004.
]Ü11[ S.J. Murdoch and G. Danezis, “Low-Cost Traffic Analysis of Tor,” Proc. IEEE Symp. Security and Privacy. May2005.
]12[ Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, “Correlation- Based Traffic Analysis Attacks on Anonymity Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 7, pp. 954-9Ü67, July .2010
]13[ C.V. Wright, L. Ballard, F. Monrose, and G.M. Masson, “Language Identification of Encrypted Voip Traffic: Alejandra y Roberto or Alice and Bob?,” Proc. 16th USENIX Security Symp. USENIX Security Symp., pp. 4:1-4:12, http://portal.acm.org/citation.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Trinity Journal of Management, IT & Media (TJMITM)
This work is licensed under a Creative Commons Attribution 4.0 International License.