Title:
Effective identities for trusted interactions in converged telecommunication systems

dc.contributor.advisor Ahamad, Mustaque
dc.contributor.author Balasubramaniyan, Vijay A. en_US
dc.contributor.committeeMember Acharya, Arup
dc.contributor.committeeMember Blough, Douglas
dc.contributor.committeeMember Lee, Wenke
dc.contributor.committeeMember Traynor, Patrick
dc.contributor.department Computing en_US
dc.date.accessioned 2012-09-20T18:24:14Z
dc.date.available 2012-09-20T18:24:14Z
dc.date.issued 2011-07-08 en_US
dc.description.abstract Telecommunication systems have evolved significantly and the recent convergence of telephony allows users to communicate through landlines, mobile phones and Voice over IP (VoIP) phones. Unfortunately this convergence has resulted in easy manipulation of caller identity, resulting in both VoIP spam and Caller ID spoofing. In this dissertation, we introduce the notion of effective identity which is a combination of mechanisms to (1) establish identity of the caller that is harder to manipulate, and (2) provide additional information about the caller. We first use effective identities to address the VoIP spam problem by proposing CallRank, a novel mechanism built around call duration and social network linkages to differentiate between a legitimate user and a spammer. To ensure that this mechanism is privacy preserving, we create a token framework that allows a user to prove the existence of a social network path between him and the user he is trying to initiate contact with, without actually revealing the path. We then look at the broader issue of determining identity across the entire telecommunication landscape to address Caller ID spoofing. Towards this, we develop PinDr0p, a technique to determine the provenance of a call - the source and the path taken by a call. In the absence of any verifiable metadata, provenance offers a means of uniquely identifying a call source. Finally, we use anomalies in timbre to develop London Calling, a mechanism to identify geography of a caller. Together, the contributions made in this dissertation create effective identities that can help address the new threats in a converged telecommunication infrastructure. en_US
dc.description.degree PhD en_US
dc.identifier.uri http://hdl.handle.net/1853/44920
dc.publisher Georgia Institute of Technology en_US
dc.subject Call provenance en_US
dc.subject Spam over internet telephony en_US
dc.subject Telecommunication security en_US
dc.subject.lcsh Telecommunication
dc.subject.lcsh Identity theft
dc.subject.lcsh Online identity theft
dc.title Effective identities for trusted interactions in converged telecommunication systems en_US
dc.type Text
dc.type.genre Dissertation
dspace.entity.type Publication
local.contributor.advisor Ahamad, Mustaque
local.contributor.corporatename College of Computing
relation.isAdvisorOfPublication ff12601d-fe5b-4a48-8669-1e1e1bc16440
relation.isOrgUnitOfPublication c8892b3c-8db6-4b7b-a33a-1b67f7db2021
Files
Original bundle
Now showing 1 - 1 of 1
Thumbnail Image
Name:
balasubramaniyan_vijay_a_201108_phd.pdf
Size:
2.2 MB
Format:
Adobe Portable Document Format
Description: