Vol.31, No.3, 2022, pp.1901-1918, doi:10.32604/iasc.2022.021309
OPEN ACCESS
ARTICLE
Bcvop2p: Decentralized Blockchain-Based Authentication Scheme for Secure Voice Communication
  • Mustafa Kara1,*, Muhammed Ali Aydın1,2, Hasan Hüseyin Balık1
1 Hezarfen ASTIN Computer Engineering Department, National Defense University, Istanbul, 34000, Turkey
2 Faculty of Engineering, Istanbul University-Cerrahpasa, Istanbul, 34320, Turkey
* Corresponding Author: Mustafa Kara. Email:
Received 28 June 2021; Accepted 29 July 2021; Issue published 09 October 2021
Abstract
Peer-to-peer VoIP applications are exposed to threats in the Internet environment as they carry out conversations over the Internet, which is an electronic communication line, and its security has always been largely a matter of concern. Authentication of the caller is the first line of defense among the security principles and is an important principle to provide security in VoIP application. Authentication methods in VoIP applications are usually based on trusted third parties or through centralized architecture. This situation creates problems in terms of single point of failure and privacy in call security over IP based communications. However, blockchain technology with a distributed architecture offers an innovative solution to multimedia communication authentication model. In this paper, a blockchain-based mutual authentication scheme for VoIP applications is proposed. In addition, the model's having a comprehensive security structure against various threats is explained via security and communication cost analysis. The proposed schema shows better performance than the methods that make a verification through the centralized architecture in the literature. The proposed model has been formally verified using the AVISPA tool, and it has been proven that the model is safe against potential threats.
Keywords
Blockchain; secure voice communication; authentication; VoIP
Cite This Article
Kara, M., Aydın, M. A., Balık, H. H. (2022). Bcvop2p: Decentralized Blockchain-Based Authentication Scheme for Secure Voice Communication. Intelligent Automation & Soft Computing, 31(3), 1901–1918.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.