scispace - formally typeset
Proceedings ArticleDOI

CallChain: Identity Authentication Based on Blockchain for Telephony Networks

Reads0
Chats0
TLDR
In this paper, the authors proposed a blockchain-based identity authentication system for telephony networks, called CallChain, which provides end-to-end identity authentication between the caller and receiver in the data channel without modifying the core technologies in telephony network.
Abstract
Telephony networks serve as a reliable communication channel, and phone numbers are usually used to authenticate users' identities in telephony networks. However, modern telephony networks does not provide end-to-end authentication for phone numbers, making it difficult for a receiver to confirm a caller's real identity. Moreover, due to the lack of effective authentication solutions for users, phone numbers are usually exploited to commit identity theft, credit card fraud, or telecom harassment by phone number spoofing a ttacks. I n t his paper, we propose a blockchain-based identity authentication system for telephony networks, CallChain. CallChain issues verifiable digital identities to users which bound a user to his/her phone number. Based on the digital identity, CallChain provides end-to-end identity authentication between the caller and receiver in the data channel without modifying the core technologies in telephony networks. In the proposed system, users first register decentralized identities (DIDs) and store them in the blockchain distributed ledger. Then Call Center issues verifiable PhoneNumber Credentials to users. And finally users conduct end-to-end identity authentication based on these PhoneNumber Credentials before the call is established. We implement a prototype as an App for Android-based phones based on an open source blockchain platform Hyperledger Indy. Moreover, we detect that CallChain only adds a worst-case 2.1 seconds call establishment overhead and can resist DDoS attacks effectively.

read more

Citations
More filters
Journal ArticleDOI

VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain

TL;DR: In this article , the authors proposed a new decentralized blockchain-based identity authentication mechanism for VoIP networks, VoIPChain, which utilizes the main features of the blockchain platform, such as immutability, transparency, and fault tolerance, to provide data privacy and secure communication in VoIP applications.
Journal ArticleDOI

A Systematic Literature Mapping on Using Blockchain Technology in Identity Management

- 01 Jan 2023 - 
TL;DR: In this paper , Wu et al. provide a systematic literature mapping of blockchain-based identity management solutions, including categorization of studies into predefined categories (domain, research type, place of publication), analysis of publication frequency, co-authorship, and number of papers citing each paper of all studied papers.

UCBlocker: Unwanted Call Blocking Using Anonymous Authentication

Changlai Du
TL;DR: In this paper , an end-to-end approach is presented to block unwanted calls while allowing users to define the policies of acceptable calls. But the proposed solution involves a new infrastructure based on anonymous credentials, which enables anonymous caller authentication and policy definition.
Journal ArticleDOI

A Systematic Literature Mapping on Using Blockchain Technology in Identity Management

TL;DR: In this paper , Wu et al. provide a systematic literature mapping of blockchain-based identity management, including categorization of studies into predefined categories (domain, research type, place of publication), analysis of publication frequency, co-authorship, and number of papers citing each paper of all studied papers.
References
More filters
Proceedings ArticleDOI

Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones

TL;DR: This paper challenges the assumption that the voice channel, over which SAS is validated by the users, provides the properties of integrity and source authentication, and reports on automated SAS voice imitation man-in-the-middle attacks that can compromise the security of Crypto Phones in both two-party and multi-party settings.
Proceedings ArticleDOI

You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks

TL;DR: An end-to-end caller ID verification mechanism CallerDec that works with existing combinations of landlines, cellular and VoIP networks and can be deployed at the liberty of users, without any modification to the existing infrastructures is proposed.
Proceedings Article

Authenticall: efficient identity and content authentication for phone calls

TL;DR: This paper proves that strong and efficient end-to-end authentication for phone networks is approaching a practical reality and demonstrates that AuthentiCall can be used to provide strong authentication before calls are answered, allowing users to ignore calls claiming a particular Caller ID that are unable or unwilling to provide proof of that assertion.
Patent

Practical end-to-end cryptographic authentication for telephony over voice channels

TL;DR: In this paper, the methods and apparatuses for providing cryptographic authentication within a voice channel are disclosed, which can operate between telephonic systems and be suitable for operating over G711/PCMu, AMR and SPEEX™ codecs.
Proceedings ArticleDOI

MSNET-Blockchain: A New Framework for Securing Mobile Satellite Communication Network

TL;DR: Through integrating emerging blockchain techniques with both communication and physical aspects, the developed framework cannot only effectively detect the cyber attacks, but also better defend the mobile satellite communication networks through communication and satellite management aspects.