An End-to-End Encrypted Scheme for PoС Based on Cellular Network

Article Preview

Abstract:

PoC is an instant communication service based on cellular network, which can transmit information of voice by VoIP. In order to increase the security of network transmission of PoC system, this paper proposes an end-to-end encrypted scheme which implement information synchronization of voice data by using stream encryption.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

935-938

Citation:

Online since:

December 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] P. Kim, A. Balazs, E. Brock, G. Kieselinann, W. Bohm, IMS-based push-to-talk over GPRS/UMTS, Wireless Communications and Networking Conference (WCNC), Mar. (2005).

DOI: 10.1109/wcnc.2005.1424902

Google Scholar

[2] Haiwen Li, Research and Implementation of The PoC System over Heterogeneous Cellular Network, IEEE TENCON (2013).

Google Scholar

[3] D. Boneh, M. Franklin Identity-based encryption from the Weil pairing: Advanced in CryptologyCrypto'2001, LNCS 2139[C], 2001: 213-229.

DOI: 10.1007/3-540-44647-8_13

Google Scholar

[4] C. Gentry and A. Silverberg, Hierarchical ID-Based Cryptography, Asiacrypt,(2002).

Google Scholar

[5] Jaeduck Choi, Souhwan Jung Kwangyong Bae. A LightWeight Authentication and Hop-by-Hop Securiy Mechanism for SIP Network[R] . International Conference on Advanced Technologies for Communications 2008, 235-238.

DOI: 10.1109/atc.2008.4760563

Google Scholar

[6] Jaeduck Choi, Souhwan Jung Kwangyong Bae. A LightWeight Authentication and Hop-by-Hop Securiy Mechanism for SIP Network[R] . International Conference on Advanced Technologies for Communications 2008, 235-238.

DOI: 10.1109/atc.2008.4760563

Google Scholar