Open Access Open Access  Restricted Access Subscription or Fee Access

Secured Routing Protocol based on Secret Sharing in Voice Systems

C. Chandrasekar, S. Padmavathy


Voice over IP is the process of transmission of voice over packet-switched IP networks is one of the most important emerging trends in telecommunications. The VOIP introduces both security risks and opportunities. VOIP has a very different architecture than traditional circuit-based telephony, and these differences result in significant security issues. Lower cost and greater flexibility are among the promises of VOIP for the enterprise, but VOIP should not be installed without careful consideration of the security problems introduced. VOIP systems take a wide variety of forms, including traditional telephone handsets, conferencing units, and mobile units. In addition to end-user equipment, VOIP systems include a variety of other components, including call processors/call managers, gateways, routers, firewalls, and protocols. Most of these components have counterparts used in data networks, but the performance demands of VOIP mean that ordinary network software and hardware must be supplemented with special VOIP components. Quality of Service (QoS) is fundamental to the operation of a VOIP network that meets users’ quality expectations. However, the implementation of various security measures can cause a marked deterioration in QoS. These complications range from firewalls delaying or blocking call setups to encryption-produced latency and delay variation (jitter). Because of the time-critical nature of VOIP, and its low tolerance for disruption and packet loss, many security measures implemented in traditional data networks are simply not applicable to VOIP in their current form; firewalls, intrusion detection systems, and other components must be specialized for VOIP. Thus an anonymous multipath routing protocol that is a secured protocol called AOMDV, based on secret sharing is proposed. The protocol provides identity anonymity, location anonymity, data and traffic anonymity by employing cryptograph technology and secret sharing in VOIP communication process. Simulation results show that the proposed scheme provides a reasonably good level of network security


Voice over IP, AOMDV, Quality of Service, Multipath Routing, Secret Sharing, Anonymity

Full Text:



D. Richard Kuhn, Thomas J. Walsh, Steffen Fries, “Security Considerations for Voice Over IP Systems”, Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-58

L. Zhou, Z. J. Haas. Securing ad hoc networks. IEEE Network, 1999, 13(6): 24–30.

Tsirigos, Z. J. Haas. Analysis of multipath routing, Part 2: mitigation of the effects of frequently changing network topologies. IEEE Trans. on Wireless Communications, 2004, 3(2): 500–511.

K. Sanzgiri, D. LaFlamme, B. Dahill, et al. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications, 2005, 23(3): 598–609.

Vaidya, J. Pyun, J. Park, et al. Secure multipath routing scheme for mobile ad hoc network. Proc. of Third IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2007: 163–171.

R. Mavropodi, P. Kotzanikolaou, C. Douligeris. SecMR - a secure multipath routing protocol for ad hoc networks. Ad Hoc Networks, 2007, 5(1): 87–99.

W. Lou, W. Liu, Y. Zhang, et al. SPREAD: improving network security by multipath routing in mobile ad hoc networks. Wireless Networks, 2009, 15(3): 279–294.

Berry Schoenmakers,” A simple publicly verifiable secret sharing scheme and its application to electronic voting”, CRYPTO 99 vol 1666 of lecture notes in computer science ,springer-verlag,1999,pp: 148-164

Chung-Hsin Liu,Chun-lin Lo,”The simulation for the SIP DDoS attack”,2009 Fifth international IEEE conference on INC, IMS and IDC

Dannan Lin, Charles A. shoniregun, Galyna A.Akmayeva, “The softphone security”,2008,IEEE international conference

Eric Y.Chen, Mistutaka Itoh,” A whitelist approach to protect SIP servers from flooding attacks”, IEEE conference, 2010.

Gauravkumar raval, Amitava pal,” VoIprotect: A layered security Architecture”, Tenth IEEE international symposium on Multimedia,2008

Hugo Krawczyk,”secret sharing made short”, 1998, Sprin-ger-verlag

JoongMan Kim, SeokUng Yoon,Hyuncheol Jeong, Yoojae Won, “implementation and evaluation of SIP based secure VoIP communication system”,2008,IEEE/IFIP international conference on embedded and ubiquitous computing

Rafael Mendes Pereira and Liane margarida Rockenbach Tarouco,”adaptive multiplexing based on E-Model for re-ducing network overhead in voice over IP security ensuring conversation

quality”,2009 fourth international conference on digital telecommunications

Rainer Falk,Steffen Fries, Hans Joachim Hof ,2010 third international conference on advances in human oriented and personalized mechanisms , Technologies and services

Ryouichi Nishimura,Shun-ichiro Abe,Norihiro Fujita and Yoiti Suzuki,” Reinforcement of VoIP security with multi-path routing and secret sharing scheme”,Jouranl of informa-tion hiding and multimedia signal processing,2010,Vol 1,number 3, July 2010,ISSn: 2073-4212

H. Aiache, F. Haettel, L. Lebrun, et al. Improving security and performance of an ad hoc network through a multipath routing strategy. Journal in Computer Virology, 2008, 4(4): 267–278.

Y. Dong, T. W. Chim, V. O. K. Li, et al. ARMR: anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Networks, 2009, 7(8): 1536– 1550.

D. B. Johnson, D. A. Maltz, Y.C. Hu. The dynamic source routing protocol for mobile Ad Hoc networks (DSR). draftietf- manet-dsr-09.txt, 2003.

M. Guerrero Zapata and N. Asokan, “Securing Ad hoc Routing Protocols,” in Proceedings of the 1st ACM workshop on Wireless security, Atlanta, GA, USA, Sep 2002, pp. 1–10.

Nasipuri A, Castaneda R, Das SR, “Performance of multipath routing for on demand protocols in mobile ad hoc networks”, ACM/Kluwer Mobile Networks and Applications (MONET), Vol. 6, No. 4, Pp. 339–349, 2001.

Zhiyuan Liu; Shejie Lu; Jun Yan; “Secure Routing Protocol based Trust for Ad Hoc Networks”, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Vol. 1, Page(s): 279 – 283, 2007.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.