Secure Voip Call on Android Platform

1
saruchi kukkar
saruchi kukkar
2
Dr. Saruchi Kukkar
Dr. Saruchi Kukkar
1 Lovely Professional University

Send Message

To: Author

GJCST Volume 12 Issue E12

Article Fingerprint

ReserarchID

CSTNWS6D677

Secure Voip Call on Android Platform Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

In the Secure voice call, the human voice shall be digitized by the Android APIs and the VOIP packets will travel over the SIP layer. The digitization process also includes the encryption phase wherein secure call technique is used in order to generate unique keys every time a call handshake is done. During the Secure Call key exchange, the caller party sends a Secure Call hello packet. Once that packet is positively acknowledged by the recipient party the handshake happens successfully and the call packets get encrypted. Using Secure call, digitized voice data is transformed into cipher text form on third generation GSM data or GPRS servers in android platform which results in a better encrypted voice speed and clarity.

26 Cites in Articles

References

  1. D Angelos,Keromytis (2011). A Comprehensive Survey of Voice over IP Security Research.
  2. Nor Shahniza,Kamal Bashah,Tore Jonvik,& Do Van Thanh (2010). A Mobile Service Architecture for improving Availability and Continuity.
  3. Lu Tian,Nicolas Dailly,Qiao Qiao,Jihua Lu1,Jiannan Zhang,Jing Guo,Ji'ao Zhang (2010). Study of SIP Protocol Through VOIP Solution of Asterisk.
  4. Chan Yeob,Yeun,Salman Mohammed,Al-Marzouqi (2009). Practical Implementations for Securing VOIP Enabled Mobile Devices.
  5. Chung-Hsin Liu,Chun-Lin Lo (2009). The Study of the SIP for the VoIP.
  6. Liancheng Shan,Ning Jiang (2009). Research on Security Mechanisms of SIP-Based VoIP System.
  7. Robin Mohammed A Qadeer,Sarvat Kasana,Sayeed (2009). Encrypted Voice Calls with IP enabled Wireless Phones over GSM/ CDMA/ WiFi Networks.
  8. Pablo Montoro,Eduardo Casilari (2009). A Comparative Study of VOIP Standards with Asterisk.
  9. Theo Zourzouvillys,Eric Rescorla (2009). An Introduction to Standards-Based VoIP: SIP, RTP, and Friends.
  10. Ahmad Ali Habeeb,Mohammed Qadeer,Shamshir Ahmad (2007). Voice Communication over GGSN/SGSN.
  11. P Thermos,A Takanen (2007). Securing VOIP Networks: Threats, Vulnerabilities, and Countermeasures.
  12. Tuneesh Lella,Riccardo Bettati (2007). Privacy of encrypted voice-over-IP.
  13. D Kuhn,T Walsh,S Fries (2005). Security considerations for Voice Over IP Systems.
  14. T Abbasi,S Prasad,N Seddigh,I Lambadaris (2003). A comparative study of the SIP and IAX VoIP protocols.
  15. Q Shen (2003). Performance of VOIP over GPRS.
  16. At&t Goode,Weston Labs (2002). Voice over Internet protocol (VOIP).
  17. J Rosenberg,H Schulzrinne,G Camarillo,A Johnston,J Peterson,R Sparks,M Handley,E Schooler (2002). SIP: Session Initiation Protocol.
  18. R Kalden,I Meirick,M Meyer (2002). Wireless Internet access based on GPRS.
  19. D Si,Q Long,X Han,W Zou (2002). Security mechanisms for SIP-based multimedia communication infrastructure.
  20. Phone Lin,Yi-Bing Lin (2001). Channel allocation for GPRS.
  21. J Mcnair,I Akyildiz,M Bender (2000). An inter-system handoff technique for the IMT-2000 system.
  22. J Dimarzio (2009). Android A programmers guide.
  23. William Stallings (2007). Web-Based Security Protocols.
  24. J Van Meggelen,J Smith,L Madsen (2007). Asterisk: The Future of Telephony.
  25. Emmanuel Seurre,Patrick Savelli,Pierre-Jean Pietri (2003). GPRS for mobile Internet.
  26. J Regis,Bates (2002). General Packet Radio Services.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

saruchi kukkar. 2012. \u201cSecure Voip Call on Android Platform\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 12 (GJCST Volume 12 Issue E12): .

Download Citation

Issue Cover
GJCST Volume 12 Issue E12
Pg. 11- 21
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
Not Found
Version of record

v1.2

Issue date

July 31, 2012

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 9853
Total Downloads: 2524
2026 Trends
Research Identity (RIN)
Related Research

Published Article

In the Secure voice call, the human voice shall be digitized by the Android APIs and the VOIP packets will travel over the SIP layer. The digitization process also includes the encryption phase wherein secure call technique is used in order to generate unique keys every time a call handshake is done. During the Secure Call key exchange, the caller party sends a Secure Call hello packet. Once that packet is positively acknowledged by the recipient party the handshake happens successfully and the call packets get encrypted. Using Secure call, digitized voice data is transformed into cipher text form on third generation GSM data or GPRS servers in android platform which results in a better encrypted voice speed and clarity.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Secure Voip Call on Android Platform

Dr. Saruchi Kukkar
Dr. Saruchi Kukkar

Research Journals