Secure VoIP based mobile communication for Android™ phones

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
1 IP Telephony (VoIP) CSI4118 Fall Introduction (1) A recent application of Internet technology – Voice over IP (VoIP): Transmission of voice.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Chapter 5 standards for multimedia communications
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
29.1 Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
29.1 Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Application layer (continued) Week 4 – Lecture 2.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
Wireless Audio Conferencing System (WACS) Mehmet Ali Abbasoğlu Furkan Çimen Aylin Deveci Kübra Gümüş.
Introduction to the Application Layer Computer Networks Computer Networks Spring 2012 Spring 2012.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
Academic Advisor: Dr. Yuval Elovici Professional Advisor: Yuri Granovsky Team: Yuri Manusov Yevgeny Fishman Boris Umansky.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Leveraging Existing Application Processors in Mobile Devices to Implement VoIP Client.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
WebRTC – Challenges and Best Practices Sumit Amar Director of Engineering Electronic Arts.
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
ITNW 1380 COOPERATIVE EDUCATION – NETWORKING Spring 2010 Seminar # 4 VOIP Network Solutions.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder,
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
P2P VoIP Speaker : Ching Chen Chang Date: 2007/09/27.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
1 How Streaming Media Works Bilguun Ginjbaatar IT 665 Nov 14, 2006.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
IP Multicast A convention to identify a multicast address Each node must translate between an IP multicast address and a list of networks that contain.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
H.323 An International Telecommunications Union (ITU) standard. Architecture consisting of several protocols oG.711: Encoding and decoding of speech (other.
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
1 Client Software and Mail Hosts Client PC has client software that communicates with user’s mail host Mail hosts deliver outgoing mail to.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 28 Multimedia.
Media Handling in FreeSWITCH Moisés Silva Software Engineer / Manager
Chapter 28. Network Management Chapter 29. Multimedia
Omar A. Abouabdalla Network Research Group (USM) SIP – Functionality and Structure of the Protocol SIP – Functionality and Structure of the Protocol By.
Session Initiation Protocol (SIP) Chapter 5 speaker : Wenping Zhang data :
ON THE SECURITY OF ANDROID COMMUNICATION APPS September 2015 By Shasi Pokharel Bachelor Of Information Technology (Honours) Supervisors: Dr. Raymond Choo,
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
Voice over Internet Protocol Presenter: Devesh Patidar Arunjay Singh August 2, 2009.
Multimedia Streaming I. Fatimah Alzahrani. Introduction We can divide audio and video services into three broad categories: streaming stored audio/video,
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
Communication Methods
3/10/2016 Subject Name: Computer Networks - II Subject Code: 10CS64 Prepared By: Madhuleena Das Department: Computer Science & Engineering Date :
LO2 Understand the key components used in networking.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
IP Telephony (VoIP).
Virtual Private Networks
Securing the Network Perimeter with ISA 2004
VOICE AND VIDEO OVER IP VOIP, RTP, RSVP.
Introduction to Networking
VOICE OVER INTERNET PROTOCOL
Unit 8 Network Security.
Presentation transcript:

Secure VoIP based mobile communication for Android™ phones Secfone Secure VoIP based mobile communication for Android™ phones

INTRODUCTION Security is facing more and more popularity and becoming the focus of technology: Extreme viruses Sophisticated spy applications Thousands of malwares + Easily accessible and cheap spy hardwares from internet web stores More and more company tries to reply and develop its own application choosing from good available encrypting mechanisms, however inadequate utilization involve more serious vulnerability and false safety feeling

To be secured and protected: INTRODUCTION To be secured and protected: Best available encryption technology has to be used Hidden and real secure authenticated method has to be used Have to be ensured that softwares cannot access to encryption keys Have to ensured that encryption method cannot be deciphered Have to be ensured that 3rd party application cannot use our device and by-pass applied security The solution is MVCN™ based security devices

Secfone is part of MVCN product line… The MVCN™ network Secfone is part of MVCN product line…

Hardware based encryption The MVCN™ layer Patented 3 level key exchange mechanism: 2048bit RSA keys for Authentication 1024bit RSA keys for communication key exchange 448bit Blowfish CBC for voice/data encryption (variable) with constantly changing keys Hardware based encryption and authentication

Role of MVCN™ layer Authentication Encryption Privacy Hardware based Authenticates an ensures the participants Hardware based Encryption Encrypt and decrypt dataflow with continuously changing keys between communicating devices Hardware based Privacy No 3rd party device, no server, no central application can access to user communication

Hardware encryption device No known method can access to keys (x-ray, electron-microscope, etc.) CRYPTOCARD Keys and encryption method never revealed to application TPM chip in: Secbox Secbox H Secbox Industrial Rabbit Cryptocard: Secfone Red Secfone Orange iSecfone SecBerry

MVCN™ - key exchange w Burned into MVCN™ server Stored on MVCN™ server Server decoding key SF1 encoding key SF2 encoding key SF1 IP address, encoding key request Connection request to SF2 Server response SF1 IP address, SF1 encoding key Server response: SF2 IP address, SF2 encoding key Secfone 1 (SF1) Secfone 2 (SF2) Connection request from SF1 to SF2 Stored on Crypto card Stored on Crypto card Server encoding key Server encoding key SF2 IP address, encoding key SF1 IP address, encoding key Server response: SF2 IP address, SF2 encoding key Burned into Crypto card Burned into Cypto card SF1 decoding key SF1 decoding key

VoIP communication Calls are VoIP based: Encrypted communication is working on almost any kind of IP based network (Wi-Fi, WiMAX, LTE, HSDPA, UMTS, EDGE, etc.) 3 VoIP layer: Session Initiation Protocol Session Description Protocol Realtime Transport Protocol

Session Initiation Protocol in Secfone SIP protocol IETF defined signaling protocol Opens communication sessions over IP network The protocol enables to open, modify and close two or multiparty sessions Secfone uses modified SIP protocol: Basic SIP P2P call (through MVCN network) Basic SIP signaling (ringing, ringtone, busy tone, waiting tone, etc.) Caller name and number display Call waiting, muting Voice compressing and time fragment size (packet time) negotiation through SDP Missed calls and call history Local user directory Volume control

Session Description Protocol Session Description Protocol (SDP)  A format for describing streaming media initialization parameters in an ASCII string. SDP is used in Secfone in conjunction with the SIP and RTP protocols Constrained to general session and connection description parameters. The media section of the SDP protocol is used for media attributes negotiation: The speech codec to be used by both peers during the negotiated session The RTP packet time (ptime) to be used by both peers during the negotiated session

BEST AVAILABLE VOICE QUALITY Applied speech codecs Automatic and optimized speech codec selection by network quality WiFi (ptime: 60ms): Speex10 (24.6 kbps) Speex9 (18.2 kbps) + the complete 3G offer 3G (ptime: 100ms): Speex8 (15 kbps) Speex7 (15 kbps) BroadVoice16 (16 kbps) + the complete EDGE offer EDGE (ptime: 140ms): Speex6 (11 kbps) Speex5 (11 kbps) Speex4 (8 kbps) + the complete GPRS offer GPRS (ptime: 180ms): AMR_NB 4.75 (4.75 kbps) Speex4 (8 kbps) BEST AVAILABLE VOICE QUALITY Speech codecs are user selectable Speech codecs are changed during calls by network quality AMR codec rate changes during calls by network quality Narrow Band Adaptive Multirate Codec (AMR-NB) is applicable AMR-NB 4.75 kbps AMR-NB 5.15 kbps AMR-NB 5.90 kbps AMR-NB 6.70 kbps AMR-NB 7.40 kbps AMR-NB 7.95 kbps AMR-NB 10.2 kbps AMR-NB 12.2 kbps

Realtime Transport Protocol The Real-time Transport Protocol (RTP) defines a standardized packet format for delivering audio and video over IP networks Altering network characteristics would result in non-enjoyable voice quality *note that „jitter” comes from that latency which is the delay of receiving and playing the sound – not network latency RTP jitter control was developed for Secfone Low latency playback with a low packet rejection rate, ensuring both high quality sound and good conversation properties

Secfone infrastructure and characteristics CRYPTOCARD Encryption / decryption by HARDWARE Nothing can access to encryption keys Authentication and encryption protocol is MVCN™ Adaptive and safety software application for : Best quality voice communication over IP networks 3rd party spy application detection Continuous and hidden key changing during communication

Secfone infrastructure and characteristics Secured voice/data communication with other Secfones Voice SMS File sharing Secured data/voice communication through Secbox Printer Computer File sharing Etc. Secured data/voice communication in industrial environment Survaillence Camera systems Monitoring Etc.

Minimal data requirement for Secfone Requriements: The device needs to have a functional MicroSD Card slot Minimum CPU requirement of the device is 1 GHZ Minimum RAM requirement is 512 MB Minimum free space on the phone: 6.3 MB Supported devices: HTC Desire Android 2.2 Sense HTC Desire S Android 2.3.3 Sense HTC Incredible S Android 2.3.3 Sense HTC Sensation Samsung Galaxy S Android 2.1/2.2 Samsung Galaxy S (NTT Docomo) Android 2.3.3 Samsung Galaxy S II LG p350 Android 2.2.2

MVCN™ protocol for Secfone

P2P communication In case the Secfones are behind a firewall type not supported by MVCN they use proxy

Retail server options for customers Private Server The server is installed by Navayo and hosted by the customer One time fee Absolutely private infrastructure Hired server The server is installed and hosted by Navayo Monthly fee Navayo guaranteed service

Secure telephone conferencing Secfone enables secure teleconferencing for a large number of users at the same time Conference rooms can be accessed through Secbox connection Up to 500 participants at one time depending on hardware set-up Voice messages can be left in the conference rooms

Secfone secure mail service E-mail server is connected to the Internet through Secbox network security device Proxy is set on the Secfone device to enable connection to the e-mail server E-mail traffic is encyripted between the device and the e-mail server 3rd party SCB technology allows logging of Administrator activity providing added security The phone’s default e-mail client is used

Secure data access

Thank you for your attention!