Open Access iconOpen Access

ARTICLE

crossmark

Bcvop2p: Decentralized Blockchain-Based Authentication Scheme for Secure Voice Communication

Mustafa Kara1,*, Muhammed Ali Aydın1,2, Hasan Hüseyin Balık1

1 Hezarfen ASTIN Computer Engineering Department, National Defense University, Istanbul, 34000, Turkey
2 Faculty of Engineering, Istanbul University-Cerrahpasa, Istanbul, 34320, Turkey

* Corresponding Author: Mustafa Kara. Email: email

Intelligent Automation & Soft Computing 2022, 31(3), 1901-1918. https://doi.org/10.32604/iasc.2022.021309

Abstract

Peer-to-peer VoIP applications are exposed to threats in the Internet environment as they carry out conversations over the Internet, which is an electronic communication line, and its security has always been largely a matter of concern. Authentication of the caller is the first line of defense among the security principles and is an important principle to provide security in VoIP application. Authentication methods in VoIP applications are usually based on trusted third parties or through centralized architecture. This situation creates problems in terms of single point of failure and privacy in call security over IP based communications. However, blockchain technology with a distributed architecture offers an innovative solution to multimedia communication authentication model. In this paper, a blockchain-based mutual authentication scheme for VoIP applications is proposed. In addition, the model's having a comprehensive security structure against various threats is explained via security and communication cost analysis. The proposed schema shows better performance than the methods that make a verification through the centralized architecture in the literature. The proposed model has been formally verified using the AVISPA tool, and it has been proven that the model is safe against potential threats.

Keywords


Cite This Article

M. Kara, M. Ali Aydın and H. Hüseyin Balık, "Bcvop2p: decentralized blockchain-based authentication scheme for secure voice communication," Intelligent Automation & Soft Computing, vol. 31, no.3, pp. 1901–1918, 2022. https://doi.org/10.32604/iasc.2022.021309



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1944

    View

  • 1095

    Download

  • 0

    Like

Share Link