Non-Repudiation for VoIP Communication in UMTS and LTE Networks

11/21/2020
by   Umut Can Cabuk, et al.
0

This thesis work presents an architectural design of a system to bring non-repudiation concept into the IP based digital voice conversations (VoIP) in LTE and UMTS networks, using electronic signatures, by considering a centralized approach. Moreover, functionalities and technical methods to support such a system are researched. Last but not least, ways to introduce this system as a public and commercial service are discussed. Non-repudiation concept provided by electronic signatures and related cryptographic functions, as introduced in this study, allow using digital records of these voice conversations as legally binding statements or proofs likewise and even instead of traditional wet signatures. The system is designed as a subsystem to IMS based 3G and 4G networks and maximum compatibility with current configurations, components and interfaces of these networks is intended. On the other hand non-repudiation is achieved by special signature, storage and verification units located in the IMS core network. Voice data is proposed to be processed in MRF unit of the IMS. Additionally, a USSD/USSI based special solution to initiate these signed calls is developed. According to the proposed scheme; during a signed call, two unidirectional voice streams originating from two parties of the call, which are transferred in IP and UDP encapsulated RTP packages, are received by the signature unit and interweaved using their arrival times, so that they become a unified stream. Signature unit generates hashes of groups of received packages and signs them using PKI algorithms and applying hash/signature chaining to increase integrity protection and to empower non-repudiation. Then, it forwards packages and signature information to the storage unit. Storage unit keeps all the call records, signature data and metadata of these calls. Verification unit later gathers relevant data from the storage unit...

READ FULL TEXT
research
11/06/2018

Digital Signature Security in Data Communication

Authenticity of access in very information are very important in the cur...
research
05/20/2023

Post-Quantum Hybrid Digital Signatures with Hardware-Support for Digital Twins

Digital Twins (DT) virtually model cyber-physical objects using Internet...
research
12/19/2016

Handwritten Signature Verification Using Hand-Worn Devices

Online signature verification technologies, such as those available in b...
research
03/23/2022

Winternitz stack protocols

This paper proposes and evaluates a new bipartite post-quantum digital s...
research
04/06/2022

Shorter Signatures from Proofs of Knowledge for the SD, MQ, PKP and RSD Problems

The MPC in the head introduced in [IKOS07] has established itself as an ...
research
01/27/2016

A First Attempt to Cloud-Based User Verification in Distributed System

In this paper, the idea of client verification in distributed systems is...
research
12/22/2018

Physical Cryptographic Signatures for Absentee Ballots

Physical signature verification on absentee ballots became a major flash...

Please sign up or login with your details

Forgot password? Click here to reset