Visible to the public Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks

TitleIntegrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Publication TypeConference Paper
Year of Publication2018
AuthorsDetken, K., Jahnke, M., Humann, M., Rollgen, B.
Conference Name2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)
Keywordsattack scenarios, authentication, composability, computer network security, cryptographic protocols, cryptography, digital networks, digital signature, digital signatures, hardware-based trusted anchor, Human Behavior, integrity, Internet, Internet protocol, Internet telephony, internet-based communication, IP networks, legacy phone technologies, Metrics, nonrepudiation, physical access, Protocols, pubcrawl, quality of service, random nodes, Repudiation, research project INTEGER, resilience, Resiliency, secure authentication, softphones, TPM2, Trusted Computing, trusted computing group, Trusted Platform Module, VoIP, VoIP communication, VoIP softphones, VoIP streams, Wi-Fi, Wi-Fi Networks, Wireless communication, Wireless fidelity, wireless LAN, wireless scenarios, wireless streaming
AbstractThe complete digitization of telecommunications allows new attack scenarios, which have not been possible with legacy phone technologies before. The reason is that physical access to legacy phone technologies was necessary. Regarding internet-based communication like voice over the internet protocol (VoIP), which can be established between random nodes, eavesdropping can happen everywhere and much easier. Additionally, injection of undesirable communication like SPAM or SPIT in digital networks is simpler, too. Encryption is not sufficient because it is also necessary to know which participants are talking to each other. For that reason, the research project INTEGER has been started with the main goals of providing secure authentication and integrity of a VoIP communication by using a digital signature. The basis of this approach is the Trusted Platform Module (TPM) of the Trusted Computing Group (TCG) which works as a hardware-based trusted anchor. The TPM will be used inside of wireless IP devices with VoIP softphones. The question is if it is possible to fulfill the main goals of the project in wireless scenarios with Wi-Fi technologies. That is what this contribution aims to clarify.
DOI10.1109/IDAACS-SWS.2018.8525847
Citation Keydetken_integrity_2018