{"id":14752,"date":"2013-07-17T18:13:08","date_gmt":"2013-07-17T22:13:08","guid":{"rendered":"http:\/\/sciencebusiness.technewslit.com\/?p=14752"},"modified":"2013-07-17T18:13:08","modified_gmt":"2013-07-17T22:13:08","slug":"research-to-develop-peer-to-peer-voip-security-protocol","status":"publish","type":"post","link":"https:\/\/technewslit.com\/sciencebusiness\/?p=14752","title":{"rendered":"Research to Develop Peer-to-Peer VoIP Security Protocol"},"content":{"rendered":"<figure id=\"attachment_14758\" aria-describedby=\"caption-attachment-14758\" style=\"width: 220px\" class=\"wp-caption alignright\"><a href=\"http:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2013\/07\/NiteshSaxena_UAB.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-14758\" alt=\"Nitesh Saxena (University of Alabama at Birmingham)\" src=\"http:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2013\/07\/NiteshSaxena_UAB.jpg\" width=\"220\" height=\"208\" srcset=\"https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2013\/07\/NiteshSaxena_UAB.jpg 220w, https:\/\/technewslit.com\/sciencebusiness\/wp-content\/uploads\/2013\/07\/NiteshSaxena_UAB-150x141.jpg 150w\" sizes=\"auto, (max-width: 220px) 100vw, 220px\" \/><\/a><figcaption id=\"caption-attachment-14758\" class=\"wp-caption-text\">Nitesh Saxena (University of Alabama at Birmingham)<\/figcaption><\/figure>\n<p>A computer science research group at <a href=\"http:\/\/www.uab.edu\/news\/latest\/item\/3608-uab-research-to-improve-online-communication-security\">University of Alabama in Birmingham<\/a> is studying a new security scheme to better protect voice- and video-over-Internet Protocol (VoIP) communications. The team led by Birmingham computer science professor <a href=\"http:\/\/saxena.cis.uab.edu\/\">Nitesh Saxena<\/a> is funded by a two-year $150,000 grant from Cisco Systems.<\/p>\n<p>Saxena, with Birmingham computer science colleague <a href=\"http:\/\/www.cis.uab.edu\/puri\/\">Purushotham Bangalore<\/a>, will investigate new solutions for securing VoIP services, such as Skype or Vonage. VoIP communications are considered vulnerable to threats such as eavesdropping and man-in-the-middle attacks, where a third party makes connections independently with the network users and intercepts or fabricates messages between them. These kinds of attacks can compromise each user\u2019s device and expose confidential information.<\/p>\n<p>Cisco Systems, the funder of the project, makes <a href=\"http:\/\/www.cisco.com\/en\/US\/products\/sw\/voicesw\/index.html\">VoIP phone equipment<\/a>. In Janury 2013, computer scientists at <a href=\"http:\/\/engineering.columbia.edu\/seas-computer-scientists-find-vulnerabilities-cisco-voip-phones\">Columbia University<\/a> found security weakneses in Cisco&#8217;s VoIP phones, which make it possible for third parties to insert malicious code in the devices&#8217; firmware, and eavesdrop on conversations. The Columbia study said all of Cisco&#8217;s 14 VoIP phone models at the time had this vulnerability.<\/p>\n<p>Securing VoIP calls with today&#8217;s technology makes use of a shared third-party cryptographic key. Saxena and colleagues will instead design and test a peer-to-peer mechanism, removing the need and potential vulnerability from a third-party key.<\/p>\n<p>The proposed solution makes use of a technique known as <a href=\"http:\/\/www.iacr.org\/archive\/crypto2005\/36210303\/36210303.pdf\">short authenticated strings<\/a>, which employs an extra channel for confirming identities and securing the session, but not a third party. The study will also investigate adapting this technique for multi-party &#8212; e.g. conferencing &#8212; as well as point-to-point calls.<\/p>\n<p>Saxena is director of the university&#8217;s Security and Privacy in Emerging computing and networking Systems (<a href=\"http:\/\/spies.cis.uab.edu\/\">SPIES<\/a>) research group, as well as a member of the\u00a0<a href=\"http:\/\/thecenter.uab.edu\/\">Center for Information Assurance and Joint Forensics Research<\/a>, a multidisciplinary research center at Birmingham that focuses on information assurance.<\/p>\n<p>Read more:<\/p>\n<ul>\n<li><a href=\"http:\/\/sciencebusiness.technewslit.com\/?p=14727\">Eye-Tracking Shown Feasible as Alternative to Passwords<\/a><\/li>\n<li><a href=\"http:\/\/sciencebusiness.technewslit.com\/?p=14444\">Wi-Fi Signals Configured as Multi-Room Motion Detector<\/a><\/li>\n<li><a href=\"http:\/\/sciencebusiness.technewslit.com\/?p=13700\">Weaknesses Found in Online Banking, Facebook Security<\/a><\/li>\n<li><a href=\"http:\/\/sciencebusiness.technewslit.com\/?p=12716\">Personal Genetic Information Vulnerabilty Exposed<\/a><\/li>\n<li><a href=\"http:\/\/sciencebusiness.technewslit.com\/?p=11834\">Challenge Seeks Smartphone GPS Jamming Detector<\/a><\/li>\n<\/ul>\n<p style=\"text-align: center;\">*\u00a0\u00a0\u00a0\u00a0 *\u00a0\u00a0\u00a0\u00a0 *<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A computer science research group at University of Alabama in Birmingham is studying a new security scheme to better protect voice- and video-over-Internet Protocol (VoIP) communications. The team led by Birmingham computer science professor Nitesh Saxena is funded by a two-year $150,000 grant from Cisco Systems. Saxena, with Birmingham computer science colleague Purushotham Bangalore, will [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,15],"tags":[109,86,38,105,78,26],"class_list":["post-14752","post","type-post","status-publish","format-standard","hentry","category-finance","category-products","tag-computer-science","tag-engineering","tag-grant","tag-physical-sciences","tag-software","tag-university"],"_links":{"self":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts\/14752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14752"}],"version-history":[{"count":8,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts\/14752\/revisions"}],"predecessor-version":[{"id":14761,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=\/wp\/v2\/posts\/14752\/revisions\/14761"}],"wp:attachment":[{"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14752"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14752"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewslit.com\/sciencebusiness\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}