Demonstration of unobservable voice over IP

M. Knezevic, V. Velichkov

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

We describe UV: a two-node system for unobservable voice communication on the Internet. UV provides unobservability of communication by hiding the fact that there is a conversation taking place. To achieve this, the system uses techniques such as encryption, constant traffic generation, equal packet sizes, and a fixed packet sending schedule. We evaluate the influence of the constant traffic generation on the general performance of UV with experiments on the Internet and in a wireless setting simulated with network simulator NS2. We conclude that although the requirements for privacy protection and usability are often mutually exclusive, they can still be combined in a way that they offer both reasonable performance and good privacy protection.
Original languageEnglish
Title of host publication2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks
Pages1-3
Number of pages3
DOIs
Publication statusPublished - 1 Jun 2008
Event9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks - Newport Beach, United States
Duration: 23 Jun 200826 Jun 2008

Conference

Conference9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
Abbreviated titleWOWMOM 2008
Country/TerritoryUnited States
CityNewport Beach
Period23/06/0826/06/08

Keywords / Materials (for Non-textual outputs)

  • Internet telephony
  • telecommunication security
  • telecommunication traffic
  • voice communication
  • unobservable voice over IP
  • unobservable voice communication
  • Internet
  • constant traffic generation
  • encryption
  • equal packet sizes
  • fixed packet sending schedule
  • privacy protection
  • Privacy
  • Wireless communication
  • Security
  • Communication system security
  • Delay
  • Noise

Fingerprint

Dive into the research topics of 'Demonstration of unobservable voice over IP'. Together they form a unique fingerprint.

Cite this