1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder,

Slides:



Advertisements
Similar presentations
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
Advertisements

Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
Chapter 7: Transport Layer
Lecture 7 Transport Layer
1 © 2004, Cisco Systems, Inc. All rights reserved IP Telephony Security Cisco Systems.
Voice over IP and IP telephony Network convergence – Telephone and IT – PoE (Power over Ethernet) Mobility and Roaming Telco – Switched -> Packet (IP)
Application layer (continued) Week 4 – Lecture 2.
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Transmission Control Protocol (TCP) and Packet-Switching Hardware Devang Parekh EE290F 4/15/04.
5/3/2006 tlpham VOIP/Security 1 Voice Over IP and Security By Thao L. Pham CS 525.
Gursharan Singh Tatla Transport Layer 16-May
Lecturer: Tamanna Haque Nipa
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Voice over IP Fundamentals M. Arvai NEC Senior Technical Eng. 1.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
Data Communications and Networks
OSI Model Routing Connection-oriented/Connectionless Network Services.
Lab #2 CT1406 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
3. VoIP Concepts.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
SEED Infotech Pvt. Ltd. 1 Networking in Java. SEED Infotech Pvt. Ltd. 2 Objectives of This Session Describe issues related to any type of network using.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Transport Layer Layer #4 (OSI-RM). Transport Layer Main function of OSI Transport layer: Accept data from the Application layer and prepare it for addressing.
Lect1..ppt - 01/06/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 2 Protocols and the TCP/IP Suite by Zornitza Genova Prodanoff.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
University of the Western Cape Chapter 12: The Transport Layer.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
CSP Implementing a network 1 Implementing a network Lecturer: Smilen Dimitrov Cross-sensorial processing – MED7.
Voice Over Internet Protocol (VoIP). Basic Components of a Telephony Network.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
©Brooks/Cole, 2003 Model and protocol  A model is the specification set by a standards organization as a guideline for designing networks.  A protocol.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
4061 Session 25 (4/17). Today Briefly: Select and Poll Layered Protocols and the Internets Intro to Network Programming.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
LOG Objectives  Describe some of the VoIP implementation challenges such as Delay/Latency, Jitter, Echo, and Packet Loss  Describe the voice encoding.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Voice Over IP (VoIP): Internet Telephony Dr. Najla Al-nabhan 1.
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
Net 221D:Computer Networks Fundamentals
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
3/10/2016 Subject Name: Computer Networks - II Subject Code: 10CS64 Prepared By: Madhuleena Das Department: Computer Science & Engineering Date :
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Voice Over IP (VoIP): Internet Telephony. Chapter Objectives.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
IP Telephony (VoIP).
Protocols and the TCP/IP Suite Overview and Discussion
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Introduction to Networking
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
VoIP—Voice over Internet Protocol
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Open System Interconnect (OSI).
Presentation transcript:

1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder, Colorado March 1, 2005

2 Voice over IP (VoIP) In recent years, we have witnessed a growing interest in the transmission of voice using the packet-based protocols. Voice over Internet protocol (VoIP) is a rapidly growing technology that enables the transport of voice over data networks such as the public Internet.

3 About Network Programming networks are organized as a series of layers (or levels) the rules to communicate are called protocol Examples of protocol: TCP, UDP, IP, Ethernet, HTTP the OSI reference model defines seven layers: Presentation Session Presentation Session Data Link Physical Data Link Physical usually not the concern of network programmers Network e.g. IP Transport e.g. TCP, UDP Application e.g. HTTP, FTP, SMTP

4 Socket Socket is the endpoints of a communication channel In Unix, the standard is BSD socket; in Windows, we use WinSock. WinSock basically follows the BSD socket standard, but there are some modifications. The latest version, Winsock 2, provides more support for various protocols. Two types of sockets SOCK_STREAM (TCP) SOCK_DGRAM (UDP) TCP is connection-oriented, reliable, … A stream socket works much like an input/output stream. UDP is connectionless, unreliable, send and receive in packets (may arrive out-of-order)

5 Typical Work Flow create socket bind close socket throw/receive datagram thru socket connectionless (SOCK_DGRAM, UDP) create socket bind close socket throw/receive datagram thru socket create socket bind wait for connection close socket r/w from socket create socket connect to peer close socket r/w from socket connection-oriented (SOCK_STREAM, TCP) accept connection

6 Programming Basics Things to fill in: protocol local IP address, local port remote IP address, remote port IP address is in the form Choose a port: some well known ports for network programming, choose port number > 1024 Transport layer (de-multiplexing) packets arrive port 1port 2port N

7 The basic idea behind VoIP The user’s voice is converted from analogue form into a digital form, compressed and broken down into a series of packets (Packetisation). These packets are then routed through private or public IP networks from one user to another and reassembled and decompressed at the receiving side.

8 Quality of Service is fundamental to the operation of a VoIP network. Despite all the money VoIP can save users and the network elegance it provides, if it cannot deliver at least the same quality of call setup and voice relay functionality and voice quality as a traditional telephone network, then it will provide little added value.

9 Among the factors that degrade voice quality are end-to-end delay, packet loss, delay variation, or jitter, voice compression schemes (CODECs), echo cancellation algorithms.

10 In the case of voice transmission, the maximum acceptable delay in packet delivery for optimal voice quality is 150ms, which can be extended up to 200ms in case of encrypted communications.

11 The time spent by the CODEC, the device that performs the digitization process, may vary between ms, depending on the coding schemes adopted and the quality of the reproduced signal. The queuing delay (i.e., the time spent by a packet in the router buffers waiting for being routed) may add up to 30 ms. A further delay in the range of 40-70ms, called jitter delay, is introduced by buffering arriving packets so that they can be delivered at a uniform rate.

12 VoIP Security Security is a serious bottleneck for the future of VoIP (anyone with physical access to the office LAN can potentially connect network-monitoring tools and tap into telephone conversations). Because of the time-critical nature of VoIP most of the same security measures currently implemented in today’s data networks could not be used in VoIP networks.

13 VoIP Security Vulnerabilities Voice transport protocols RTP RTCP SCTP Signaling protocols and architecture SIP H.323 MEGACO MGCP

14 What’s at Risk? IP phones Core routers Media gateways SIP proxies Gatekeepers Location servers Switches VoIP-based firewalls Any equipment in VoIP infrastructure

15 Voice Data Convergence Multiplies Threats VoIP inherits IP data network threat models Reconnaissance, DoS, host vulnerability exploit, surveillance, hijacking, identity theft, misuse, etc. VoIP QoS requirements increase exposure to DoS attacks that affect: Delay, jitter, packet loss, bandwidth PCs = authentication; phones = any user User identity theft VoIP inherits PBX phone vulnerability Unauthorized access and privileges, service theft Device identity theft Malicious devices on IP network act like IP phones Reduced service availability, eavesdropping Inserting/Deleting/Modifying audio streams

16 Threats from Phreakers and Hackers Phreakers use phone system to: Gain free calls Disrupt system Fun Hackers use computer system to: Gain free services/products Denial of Service (DoS) Business Fun

17 Denial of Service Threat DoS venues Flood Abuse protocols Target devices IP phones (easy) Routers, switches (depends on equipment) Signaling gateways, media gateways, SIP proxies Any device in the path a call takes from a caller to a called party

18 Encryption Algorithms: DES 3DES IDEA BLOWFISH TEA

19 Two rounds of the TEA block cipher

20

21 Thank You