Privacy in Voice-over-IP mitigating the risks at SIP intermediaries
Telephony plays a fundamental role in our society. It enables remote parties to interact and express themselves over great distances. The telephone as a means of communicating has become part of every day life. Organisations and industry are now looking at Voice over IP (VoIP) technologies. They wan...
Main Author: | |
---|---|
Other Authors: | |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/2263/27702 Neumann, T 2009, Privacy in Voice-over-IP mitigating the risks at SIP intermediaries, MSc dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/27702 > http://upetd.up.ac.za/thesis/available/etd-09022010-191200/ |
id |
ndltd-netd.ac.za-oai-union.ndltd.org-up-oai-repository.up.ac.za-2263-27702 |
---|---|
record_format |
oai_dc |
collection |
NDLTD |
sources |
NDLTD |
topic |
Information leaking Privacy Sip protocol Voice-over-ip Telecommunication Next generation networks Trusted intermediaries Zed UCTD |
spellingShingle |
Information leaking Privacy Sip protocol Voice-over-ip Telecommunication Next generation networks Trusted intermediaries Zed UCTD Neumann, Thorsten Privacy in Voice-over-IP mitigating the risks at SIP intermediaries |
description |
Telephony plays a fundamental role in our society. It enables remote parties to interact and express themselves over great distances. The telephone as a means of communicating has become part of every day life. Organisations and industry are now looking at Voice over IP (VoIP) technologies. They want to take advantage of new and previously unavailable voice services. Various interested parties are seeking to leverage the emerging VoIP technology for more flexible and efficient communication between staff, clients and partners. <o>VoIP is a recent innovation enabled by Next Generation Network (NGN). It provides and enables means of communication over a digital network, specifically the Internet. VoIP is gaining wide spread adoption and will ultimately replace traditional telephony. The result of this trend is a ubiquitous, global and digital communication infrastructure. VoIP, however, still faces many challenges. It is not yet as reliable and dependable as the current Public Switched Telephone Network (PSTN). The employed communication protocols are immature with many security flaws and weaknesses. Session Initiation Protocol (SIP), a popular VoIP protocol does not sufficiently protect a users privacy. A user’s information is neither encrypted nor secured when calling a remote party. There is a lack of control over the information included in the SIP messages. Our specific concern is that private and sensitive information is exchanged over the public internet. This dissertation concerns itself with the communication path chosen by SIP when establishing a session with a remote party. In SIP, VoIP calls are established over unknown and untrusted intermediaries to reach the desired party. We analyse the SIP headers to determine the information leakage at each chosen intermediary. Our concerns for possible breach of privacy when using SIP were confirmed by the findings. A user’s privacy can be compromised through the extraction of explicit private details reflected in SIP headers. It is further possible to profile the user and determine communication habits from implicit time, location and device information. Our research proposes enhancements to SIP. Each intermediary must digitally sign over the SIP headers ensuring the communication path was not be altered. These signatures are added sequentially creating a chain of certified intermediaries. Our enhancements to SIP do not seek to encrypt the headers, but to use these intermediary signatures to reduce the risk of information leakage. We created a model of our proposed enhancements for attaching signatures at each intermediary. The model also provides a means of identifying unknown or malicious intermediaries prior to establishing a SIP session. Finally, the model was specified in Z notation. The Z specification language was well suited to accurately and precisely represent our model. This formal notation was adopted to specify the types, states and model behaviour. The specification was validated using the Z type-checker ZTC. Copyright === Dissertation (MSc)--University of Pretoria, 2010. === Computer Science === unrestricted |
author2 |
Prof M Olivier |
author_facet |
Prof M Olivier Neumann, Thorsten |
author |
Neumann, Thorsten |
author_sort |
Neumann, Thorsten |
title |
Privacy in Voice-over-IP mitigating the risks at SIP intermediaries |
title_short |
Privacy in Voice-over-IP mitigating the risks at SIP intermediaries |
title_full |
Privacy in Voice-over-IP mitigating the risks at SIP intermediaries |
title_fullStr |
Privacy in Voice-over-IP mitigating the risks at SIP intermediaries |
title_full_unstemmed |
Privacy in Voice-over-IP mitigating the risks at SIP intermediaries |
title_sort |
privacy in voice-over-ip mitigating the risks at sip intermediaries |
publishDate |
2013 |
url |
http://hdl.handle.net/2263/27702 Neumann, T 2009, Privacy in Voice-over-IP mitigating the risks at SIP intermediaries, MSc dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/27702 > http://upetd.up.ac.za/thesis/available/etd-09022010-191200/ |
work_keys_str_mv |
AT neumannthorsten privacyinvoiceoveripmitigatingtherisksatsipintermediaries |
_version_ |
1718498681016025088 |
spelling |
ndltd-netd.ac.za-oai-union.ndltd.org-up-oai-repository.up.ac.za-2263-277022017-07-20T04:11:20Z Privacy in Voice-over-IP mitigating the risks at SIP intermediaries Neumann, Thorsten Prof M Olivier jozzi@intdev.co.za Information leaking Privacy Sip protocol Voice-over-ip Telecommunication Next generation networks Trusted intermediaries Zed UCTD Telephony plays a fundamental role in our society. It enables remote parties to interact and express themselves over great distances. The telephone as a means of communicating has become part of every day life. Organisations and industry are now looking at Voice over IP (VoIP) technologies. They want to take advantage of new and previously unavailable voice services. Various interested parties are seeking to leverage the emerging VoIP technology for more flexible and efficient communication between staff, clients and partners. <o>VoIP is a recent innovation enabled by Next Generation Network (NGN). It provides and enables means of communication over a digital network, specifically the Internet. VoIP is gaining wide spread adoption and will ultimately replace traditional telephony. The result of this trend is a ubiquitous, global and digital communication infrastructure. VoIP, however, still faces many challenges. It is not yet as reliable and dependable as the current Public Switched Telephone Network (PSTN). The employed communication protocols are immature with many security flaws and weaknesses. Session Initiation Protocol (SIP), a popular VoIP protocol does not sufficiently protect a users privacy. A user’s information is neither encrypted nor secured when calling a remote party. There is a lack of control over the information included in the SIP messages. Our specific concern is that private and sensitive information is exchanged over the public internet. This dissertation concerns itself with the communication path chosen by SIP when establishing a session with a remote party. In SIP, VoIP calls are established over unknown and untrusted intermediaries to reach the desired party. We analyse the SIP headers to determine the information leakage at each chosen intermediary. Our concerns for possible breach of privacy when using SIP were confirmed by the findings. A user’s privacy can be compromised through the extraction of explicit private details reflected in SIP headers. It is further possible to profile the user and determine communication habits from implicit time, location and device information. Our research proposes enhancements to SIP. Each intermediary must digitally sign over the SIP headers ensuring the communication path was not be altered. These signatures are added sequentially creating a chain of certified intermediaries. Our enhancements to SIP do not seek to encrypt the headers, but to use these intermediary signatures to reduce the risk of information leakage. We created a model of our proposed enhancements for attaching signatures at each intermediary. The model also provides a means of identifying unknown or malicious intermediaries prior to establishing a SIP session. Finally, the model was specified in Z notation. The Z specification language was well suited to accurately and precisely represent our model. This formal notation was adopted to specify the types, states and model behaviour. The specification was validated using the Z type-checker ZTC. Copyright Dissertation (MSc)--University of Pretoria, 2010. Computer Science unrestricted 2013-09-07T12:05:57Z 2010-09-02 2013-09-07T12:05:57Z 2010-04-12 2010-09-02 2010-09-02 Dissertation http://hdl.handle.net/2263/27702 Neumann, T 2009, Privacy in Voice-over-IP mitigating the risks at SIP intermediaries, MSc dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/27702 > E10/436/gm http://upetd.up.ac.za/thesis/available/etd-09022010-191200/ © 2009, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria. |