JongIl Jeong

  • Citations Per Year
Learn More
VoIP is more and more popular around the world. The number of residential VoIP subscribers worldwide is predicted to rise to 197.2 million in 2010, up more than 40x from 4.8 million in 2004. But VoIP security threats are both inherent in data networks and unique to VoIP such as eavesdropping, denial of service (DoS), service abuse, and so on. Especially,(More)
VoIP market is growing fast and will replace a considerable portion of existing PSTN or 2G/3G which is under big trouble with spam calls. In VoIP, spam calls can be occurred more frequently because of its low cost and easy modification. In this paper, we propose user reputation based spam defense architecture which consists of four spam defense techniques.(More)
VoIP spam will become severe problem preventing from generalization of VoIP service. For the purpose of presenting multi-leveled anti-spit framework, we divided VoIP service domain into three independent domains as an outbound, an intermediary, and an inbound domain. The proposed framework enables administrator to establish anti-spit policies in each(More)
This paper proposes lawful interception scheme for secure VoIP (Voice over IP) communications using TTP (Trusted Third Party). The proposed scheme is that TTP creates a master key and send it to VoIP terminals, and VoIP terminals create session keys for media traffic encryption using master key. TTP sends session key to law enforcement agency for decrypting(More)
With the development of the Internet, many people are able share information freely, and check for information from various parts of the world in real time. Internet brought about the development of diverse industries, and its utilization is likely to increase through combination with many types of media in the future. However, the Internet also causes some(More)
  • 1