Active Timing Based Approach for Tracking Anonymous Peer-to-peer Network in VoIP
Karthikeyan. C1, Karthikeyan. V2, Jerin Sajeev. C. R3, Merlin Moses. M4

1Karthikeyan.C, ECE, Einstein College of Engineering, Tirunelveli.
2Karthikeyan.V, ECE, Einstein College of Engineering, Tirunelveli.
3Jerin Sajeev.C.R, ECE, Einstein College of Engineering, Tirunelveli.
4Merlin Moses.M, ECE, Einstein College of Engineering, Tirunelveli.
Manuscript received on December 25, 2013. | Revised Manuscript received on January 02, 2013. | Manuscript published on January 05, 2013. | PP: 78-82 | Volume-2, Issue-6, January 2013. | Retrieval Number: F1098112612/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Peer-to-peer VoIP calls are popular due to their low cost and convenience. When these calls are encrypted and anonymized the network becomes a secured one. Tracing of the anonymous VoIP call users are important and the traced information about them should be sent to the server to know how long the users are in communication. The key challenge in tracking encrypted VoIP calls across anonymous communication system is to identify the correlation between the VoIP flows of the caller and the callee. Since all the traffic of the peer-to-peer VoIP calls are encrypted, the best way to track anonymous VoIP calls across the internet is using the Active timing based correlation. It is done by embedding a unique watermark into the inter-packet timing domain. The analysis shows that it only takes several milliseconds time adjustment to make normal VoIP flows highly unique and the embedded delay value could be preserved across the low latency anonymizing network. In this proposal, tracking of anonymous VoIP calls across internet was successfully achieved by using active time based correlation method and the results demonstrate that tracing of anonymous peer-to-peer VoIP calls on the internet is feasible and low latency anonymizing networks are susceptible to timing attacks.
Keywords: In this proposal, tracking of anonymous VoIP