NANO SCIENTIFIC RESEARCH CENTRE PVT.LTD., AMEERPET, HYD
WWW.NSRCNANO.COM, 09640648777, 09652926926
DOT NET PROJECTS LIST--2013
DOT NET 2013 IEEE PAPERS
On
Privacy of Encrypted Speech Communications
ABSTRACT:
Silence suppression, an essential feature of speech
communications over the Internet, saves bandwidth by disabling voice packet
transmissions when silence is detected. However, silence suppression enables an
adversary to recover talk patterns from packet timing. In this paper, we
investigate privacy leakage through the silence suppression feature. More
specifically, we propose a new class of traffic analysis attacks to encrypted
speech communications with the goal of detecting speakers of encrypted speech communications.
These attacks are based on packet timing information only and the attacks can
detect speakers of speech communications made with different codecs. We
evaluate the proposed attacks with extensive experiments over different type of
networks including commercial anonymity networks and campus networks. The
experiments show that the proposed traffic analysis attacks can detect speakers
of encrypted speech communications with high accuracy based on traces of 15
minutes long on average.
EXISTING
SYSTEM:
The increasing popularity of speech
communications over the Internet has brought a lot of attention and concern over
security and privacy issues of these speech communications.
Privacy
leakage through silence suppression, an essential feature for speech communications
over the Internet. Speech communications over the Internet are needed in a wide
variety of Internet applications such as audio cast, e-learning, Internet
radio, online chat, online gaming, and VoIP telephony. This made the usage of
band width in the high ratio and makes the networks vulreneble to attacks on
the net and secure voice transmission.
PROPOSED SYSTEM:
To protect confidentiality of speech
communications, tools and protocols such as Zfone, a tool capable to encrypt
voice packets, and SRTP , the secure version of the real-time transport
protocol, are developed or implemented. To further protect privacy of speech
communications,
Advanced
users are using anonymity networks toanonymize speech communications. For this
purpose, low latency anonymity networks such as Tor and JAP can be used. One of
the common anonym zing techniques used in anonymity networks is rerouting which
usually routes Packets through a randomly selected and usually longer path
instead of the shortest path.
The proposed attacks can detect
speakers of encrypted speech communications with high probabilities. In
comparison with traditional traffic analysis attacks, the proposed traffic
analysis attacks are different in the following aspects: 1) the proposed
traffic analysis attacks do not require simultaneous accesses to one traffic
flow of interest at both sides. 2) The attacks can detect speakers of encrypted
speech communications made with different codec’s.
The major difference between the new attacks
and previous traffic analysis attacks on speech communications over the
Internet is: Previous traffic analysis attacks are based on packet size
information and the new attacks are based on packet timing information only. In
this paper,
we
assume packet size information is not available for traffic analysis attacks
because 1) voice packets generated by constant bit rate (CBR) codec’s are of
the same size, 2) encryption can pad voice packets to the same size during the
encryption process, and 3) packets in anonymity networks such as Tor are of the
same size to prevent traffic analysis attacks based on packet size information,
analysis attacks based on packet size information.
HARDWARE
REQUIREMENTS
Operating System: Windows XP (ServicePack3)
Processor:
Pentium IV
RAM:
1GB
Working
Environment: Microsoft Visual Studio 2010
Language:
C#
MODULES
·
Registration Module
·
Login Module
·
Encryption(Server Module)
·
Decryption (Client Module)
No comments:
Post a Comment