An implementation and security analysis on H.235 for VoIP security on embedded environments 


Vol. 29,  No. 7, pp. 1007-1014, Jul.  2004


PDF
  Abstract

In this paper, H.235 based security mechanism for H.323 multimedia applications was implemented in embedded environment. H.235 covers authentication using HMAC-SHA 1-96, authenticated Diffie-Hellman key exchange, security capability exchange, session key management for voice encryption, and encryption functions such as DES, 3DES, RC2. H.235-based mechanisms were also analyzed in terms of its security and possible attacks.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

D. W. Kim, K. Hong, S. Lee, S. Jung, "An implementation and security analysis on H.235 for VoIP security on embedded environments," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 7, pp. 1007-1014, 2004. DOI: .

[ACM Style]

Deok Wu Kim, Kihun Hong, Sang-hak Lee, and Souhwan Jung. 2004. An implementation and security analysis on H.235 for VoIP security on embedded environments. The Journal of Korean Institute of Communications and Information Sciences, 29, 7, (2004), 1007-1014. DOI: .

[KICS Style]

Deok Wu Kim, Kihun Hong, Sang-hak Lee, Souhwan Jung, "An implementation and security analysis on H.235 for VoIP security on embedded environments," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 7, pp. 1007-1014, 7. 2004.