Study of Measures to Secure Video Phone Service Safety through a Preliminary Evaluationof the Information Security of the New IT Service

The rapid advance of communication technology is evolving the network environment into the broadband convergence network. Likewise, the IT services operated in the individual network are also being quickly converged in the broadband convergence network environment. VoIP and IPTV are two examples of such new services. Efforts are being made to develop the video phone service, which is an advanced form of the voice-oriented VoIP service. However, the new IT services will be subject to stability and reliability vulnerabilities if the relevant security issues are not answered during the convergence of the existing IT services currently being operated in individual networks within the wider broadband network environment. To resolve such problems, this paper attempts to analyze the possible threats and identify the necessary security measures before the deployment of the new IT services. Furthermore, it measures the quality of the encryption algorithm application example to describe the appropriate algorithm in order to present security technology that will have no negative impact on the quality of the video phone service.




References:
[1] Basic BcN Establishment Plan II (draft), Ministry of Information and
Communication, 2006.3.
[2] Standard BcN Model v2.0, TTA, 2006. 12. 21.
[3] Status of BcN Information Security Technology Development, Korean
Society for Internet Information, 2005. 9.
[4] IBM Systems Science Institute.
[5] Cynthia Irvine, Timoty Levin, "Quality of Security Service", pp22-25,
DARPA/ITO Quorum PI Meeting, New Orleans, LA May.2001.
[6] DongHoon Shin, "Study of Information Security Pre-Evaluation Model
for New IT Service", Korea Information Processing Society, 2005.11.
[7] Status of BcN Information Security Technology Development, ETRI,
2005. 9.
[8] VoIP Security and Privacy Threat Taxonomy, VoIPSA, 2005. 10.
[9] Next Generation Networks and Security: An Introduction,
voipsecurity.org, 2005. 4.
[10] TISPAN NGN Security (NGN_SEC) Requirements, NGN Release1
(draft ETSI TS 187 001), 2005.10.
[11] ITU-T FGNGN, http://www.itu.int/ITU-T/ngn/fgngn/