Study of Measures to Secure Video Phone Service Safety through a Preliminary Evaluationof the Information Security of the New IT Service
The rapid advance of communication technology is
evolving the network environment into the broadband convergence
network. Likewise, the IT services operated in the individual network
are also being quickly converged in the broadband convergence
network environment. VoIP and IPTV are two examples of such new
services. Efforts are being made to develop the video phone service,
which is an advanced form of the voice-oriented VoIP service.
However, the new IT services will be subject to stability and reliability
vulnerabilities if the relevant security issues are not answered during
the convergence of the existing IT services currently being operated in
individual networks within the wider broadband network
environment. To resolve such problems, this paper attempts to analyze
the possible threats and identify the necessary security measures
before the deployment of the new IT services. Furthermore, it
measures the quality of the encryption algorithm application example
to describe the appropriate algorithm in order to present security
technology that will have no negative impact on the quality of the
video phone service.
[1] Basic BcN Establishment Plan II (draft), Ministry of Information and
Communication, 2006.3.
[2] Standard BcN Model v2.0, TTA, 2006. 12. 21.
[3] Status of BcN Information Security Technology Development, Korean
Society for Internet Information, 2005. 9.
[4] IBM Systems Science Institute.
[5] Cynthia Irvine, Timoty Levin, "Quality of Security Service", pp22-25,
DARPA/ITO Quorum PI Meeting, New Orleans, LA May.2001.
[6] DongHoon Shin, "Study of Information Security Pre-Evaluation Model
for New IT Service", Korea Information Processing Society, 2005.11.
[7] Status of BcN Information Security Technology Development, ETRI,
2005. 9.
[8] VoIP Security and Privacy Threat Taxonomy, VoIPSA, 2005. 10.
[9] Next Generation Networks and Security: An Introduction,
voipsecurity.org, 2005. 4.
[10] TISPAN NGN Security (NGN_SEC) Requirements, NGN Release1
(draft ETSI TS 187 001), 2005.10.
[11] ITU-T FGNGN, http://www.itu.int/ITU-T/ngn/fgngn/
[1] Basic BcN Establishment Plan II (draft), Ministry of Information and
Communication, 2006.3.
[2] Standard BcN Model v2.0, TTA, 2006. 12. 21.
[3] Status of BcN Information Security Technology Development, Korean
Society for Internet Information, 2005. 9.
[4] IBM Systems Science Institute.
[5] Cynthia Irvine, Timoty Levin, "Quality of Security Service", pp22-25,
DARPA/ITO Quorum PI Meeting, New Orleans, LA May.2001.
[6] DongHoon Shin, "Study of Information Security Pre-Evaluation Model
for New IT Service", Korea Information Processing Society, 2005.11.
[7] Status of BcN Information Security Technology Development, ETRI,
2005. 9.
[8] VoIP Security and Privacy Threat Taxonomy, VoIPSA, 2005. 10.
[9] Next Generation Networks and Security: An Introduction,
voipsecurity.org, 2005. 4.
[10] TISPAN NGN Security (NGN_SEC) Requirements, NGN Release1
(draft ETSI TS 187 001), 2005.10.
[11] ITU-T FGNGN, http://www.itu.int/ITU-T/ngn/fgngn/
@article{"International Journal of Information, Control and Computer Sciences:54303", author = "DongHoon Shin and Yunmook Nah and HoSeong Kim and Gang Shin Lee and Jae-Il Lee", title = "Study of Measures to Secure Video Phone Service Safety through a Preliminary Evaluationof the Information Security of the New IT Service", abstract = "The rapid advance of communication technology is
evolving the network environment into the broadband convergence
network. Likewise, the IT services operated in the individual network
are also being quickly converged in the broadband convergence
network environment. VoIP and IPTV are two examples of such new
services. Efforts are being made to develop the video phone service,
which is an advanced form of the voice-oriented VoIP service.
However, the new IT services will be subject to stability and reliability
vulnerabilities if the relevant security issues are not answered during
the convergence of the existing IT services currently being operated in
individual networks within the wider broadband network
environment. To resolve such problems, this paper attempts to analyze
the possible threats and identify the necessary security measures
before the deployment of the new IT services. Furthermore, it
measures the quality of the encryption algorithm application example
to describe the appropriate algorithm in order to present security
technology that will have no negative impact on the quality of the
video phone service.", keywords = "BcN, Security Measures, Video Phone.", volume = "1", number = "10", pages = "3060-6", }