Bcvop2p: Decentralized Blockchain-Based Authentication Scheme for Secure Voice Communication


Kara M., Aydin M. A., Balik H. H.

INTELLIGENT AUTOMATION AND SOFT COMPUTING, cilt.31, sa.3, ss.1901-1918, 2022 (SCI-Expanded) identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 31 Sayı: 3
  • Basım Tarihi: 2022
  • Doi Numarası: 10.32604/iasc.2022.021309
  • Dergi Adı: INTELLIGENT AUTOMATION AND SOFT COMPUTING
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Applied Science & Technology Source, Computer & Applied Sciences
  • Sayfa Sayıları: ss.1901-1918
  • Anahtar Kelimeler: Blockchain, secure voice communication, authentication, VoIP, PROTOCOL, INTERNET, TRUST, ECC
  • İstanbul Üniversitesi Adresli: Evet

Özet

Peer-to-peer VoIP applications are exposed to threats in the Internet environment as they carry out conversations over the Internet, which is an electronic communication line, and its security has always been largely a matter of concern. Authentication of the caller is the first line of defense among the security principles and is an important principle to provide security in VoIP application. Authentication methods in VoIP applications are usually based on trusted third parties or through centralized architecture. This situation creates problems in terms of single point of failure and privacy in call security over IP based communications. However, blockchain technology with a distributed architecture offers an innovative solution to multimedia communication authentication model. In this paper, a blockchain-based mutual authentication scheme for VoIP applications is proposed. In addition, the model's having a comprehensive security structure against various threats is explained via security and communication cost analysis. The proposed schema shows better performance than the methods that make a verification through the centralized architecture in the literature. The proposed model has been formally verified using the AVISPA tool, and it has been proven that the model is safe against potential threats.