Design of Internet Phon(VoIP) System for Voice Security based on VPN

VPN 기반의 음성 보안을 위한 인터넷 텔레포니(VoIP) 시스템 설계

  • 김석훈 (한남대학교 컴퓨터공학과) ;
  • 김은수 (한남대학교 교수학습지원센터) ;
  • 송정길 (한남대학교 컴퓨터공학과)
  • Published : 2006.05.01


The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.



  1. K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, G. Zorn, 'Point-to-Point Tunneling Protocol (PPTP)', RFC 2637, July 1999
  2. W. Simpson, 'The Point-to-Point Protocol (PPP)', RFC 1661, July 1994
  3. W. Simpson, 'PPP LCP Extensions', RFC 1548, January 1994
  4. W. Simpson, 'PPP Challenge Handshake Authentication Protocol (CHAP)', RFC 1994, August 1996
  5. D. Rand, 'The PPP Compression Control Protocol (CCP)', RFC 1962, June 1996
  6. G. McGregor, 'The PPP Internet Protocol Control Protocol (IPCP)', RFC 1332, May 1992
  7. G. Pall, G. Zorn, 'Microsoft Point-To-Point Encryption (MPPE) Protocol', RFC 3078, March 2001
  8. J. Postel, 'Internet Protocol', RFC 760, January 1980
  9. Li C, Li S, Zhang D, Chen G, 'Cryptanalysis of a data security protection scheme for VoIP', IEE Proceedings Vision, Vol. 153, No. 01, pp. 1-10, 2006.2
  10. Steven M. Bellovin, Susan Landau, Matt Bla, 'The real national-security needs for VoIP', Communications of the ACM, Vol. 48 No. 11 pp. 120-120,2005.11