Anonymity for End to End Voice over IP applications

Loading...
Thumbnail Image

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

The growth of communication technology has emphasized the importance of security and privacy over computer networks sharing resources and communicating with each other. Security and privacy became critical especially with the emergence of E-commerce. Other than securing the transfer of data, users are interested in protecting their profile privacy against exposure attacks. Multimedia communications like audio and video chatting are now at the core of new technology proliferation. We seek to achieve end users profile privacy without violating the QoS constraints on the throughput, end to end delay and jitter delay, as these parameters represent the most sensitive factors in modern multimedia applications. We propose an end to end anonymity design that takes into consideration the real-time constraints of VoIP applications in a hybrid network environment that involves ad-hoc and infrastructure wired networks. Using cluster head for communication anonymity to preserve user profile privacy, as well as encryption of the RTP payload for data security, we proved by calculation and by OPNET simulations that such a model can be easily integrated to the present network infrastructure.

Description

Thesis (M.E.)--American University of Beirut, Department of Electrical and Computer Engineeering, 2013.
Advisor : Dr. Hassan Ali Artail, Professor, Electrical and Computer Engineering Department--Committee Members : Dr. Ayman Kaissi, Professor, Electrical and Computer Engineering Department ; Dr. Ali Chehab, Associate Professor, Electrical and Computer Engineering Department.
Includes bibliographical references (leaves 93-110)

Keywords

Citation

Endorsement

Review

Supplemented By

Referenced By