Privacy in Voice-over-IP mitigating the risks at SIP intermediaries

dc.contributor.advisorOlivier, Martin S.en
dc.contributor.emailjozzi@intdev.co.zaen
dc.contributor.postgraduateNeumann, Thorstenen
dc.date.accessioned2013-09-07T12:05:57Z
dc.date.available2010-09-02en
dc.date.available2013-09-07T12:05:57Z
dc.date.created2010-04-12en
dc.date.issued2010-09-02en
dc.date.submitted2010-09-02en
dc.descriptionDissertation (MSc)--University of Pretoria, 2010.en
dc.description.abstractTelephony plays a fundamental role in our society. It enables remote parties to interact and express themselves over great distances. The telephone as a means of communicating has become part of every day life. Organisations and industry are now looking at Voice over IP (VoIP) technologies. They want to take advantage of new and previously unavailable voice services. Various interested parties are seeking to leverage the emerging VoIP technology for more flexible and efficient communication between staff, clients and partners. <o>VoIP is a recent innovation enabled by Next Generation Network (NGN). It provides and enables means of communication over a digital network, specifically the Internet. VoIP is gaining wide spread adoption and will ultimately replace traditional telephony. The result of this trend is a ubiquitous, global and digital communication infrastructure. VoIP, however, still faces many challenges. It is not yet as reliable and dependable as the current Public Switched Telephone Network (PSTN). The employed communication protocols are immature with many security flaws and weaknesses. Session Initiation Protocol (SIP), a popular VoIP protocol does not sufficiently protect a users privacy. A user’s information is neither encrypted nor secured when calling a remote party. There is a lack of control over the information included in the SIP messages. Our specific concern is that private and sensitive information is exchanged over the public internet. This dissertation concerns itself with the communication path chosen by SIP when establishing a session with a remote party. In SIP, VoIP calls are established over unknown and untrusted intermediaries to reach the desired party. We analyse the SIP headers to determine the information leakage at each chosen intermediary. Our concerns for possible breach of privacy when using SIP were confirmed by the findings. A user’s privacy can be compromised through the extraction of explicit private details reflected in SIP headers. It is further possible to profile the user and determine communication habits from implicit time, location and device information. Our research proposes enhancements to SIP. Each intermediary must digitally sign over the SIP headers ensuring the communication path was not be altered. These signatures are added sequentially creating a chain of certified intermediaries. Our enhancements to SIP do not seek to encrypt the headers, but to use these intermediary signatures to reduce the risk of information leakage. We created a model of our proposed enhancements for attaching signatures at each intermediary. The model also provides a means of identifying unknown or malicious intermediaries prior to establishing a SIP session. Finally, the model was specified in Z notation. The Z specification language was well suited to accurately and precisely represent our model. This formal notation was adopted to specify the types, states and model behaviour. The specification was validated using the Z type-checker ZTC. Copyrighten
dc.description.availabilityunrestricteden
dc.description.departmentComputer Scienceen
dc.identifier.citationNeumann, T 2009, Privacy in Voice-over-IP mitigating the risks at SIP intermediaries, MSc dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/27702 >en
dc.identifier.otherE10/436/gmen
dc.identifier.upetdurlhttp://upetd.up.ac.za/thesis/available/etd-09022010-191200/en
dc.identifier.urihttp://hdl.handle.net/2263/27702
dc.language.isoen
dc.publisherUniversity of Pretoriaen_ZA
dc.rights© 2009, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria.en
dc.subjectInformation leakingen
dc.subjectPrivacyen
dc.subjectSip protocolen
dc.subjectVoice-over-ipen
dc.subjectTelecommunicationen
dc.subjectNext generation networksen
dc.subjectTrusted intermediariesen
dc.subjectZeden
dc.subjectUCTDen_US
dc.titlePrivacy in Voice-over-IP mitigating the risks at SIP intermediariesen
dc.typeDissertationen

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
dissertation.pdf
Size:
2.89 MB
Format:
Adobe Portable Document Format