A mechanism to authenticate caller ID

Jikai Li, Fernando Faria, Jinsong Chen, Daan Liang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Caller ID displayed on the phone is supposed to provide accurate information of the caller. However, with the help of computer and Voice over Internet Protocol (VoIP), it is easy to spoof a Caller ID. The users of spoofing caller ID can be school district office, hospital, law enforcement, telemarketers etc. Although caller ID spoofing has legitimate uses, it imposes real threats to the receiver of the call when it is abused. In today’s world, it is important to restore the credibility of the incoming caller ID. In this work, we propose a mechanism that can authenticate certified caller IDs, which can be authentic or legitimatelyspoofed. The proposed scheme involves caller, receiver of the call, and a thirdparty to exchange short information. It is caller and receiver’s discretion to adopt this scheme. The proposed scheme does not change switch or signaling protocol. The proposed scheme can be naturally integrated into current system. An Android-based application was developed to test the idea.

Original languageEnglish
Title of host publicationRecent Advances in Information Systems and Technologies
EditorsHojjat Adeli, Ana Maria Correia, Sandra Costanzo, Luis Paulo Reis, Alvaro Rocha
PublisherSpringer-Verlag
Pages745-753
Number of pages9
ISBN (Print)9783319565378
DOIs
StatePublished - 2017
Event5th World Conference on Information Systems and Technologies, WorldCIST - Porto Santo Island, Madeira, Portugal
Duration: Apr 11 2017Apr 13 2017

Publication series

NameAdvances in Intelligent Systems and Computing
Volume570
ISSN (Print)2194-5357

Conference

Conference5th World Conference on Information Systems and Technologies, WorldCIST
Country/TerritoryPortugal
CityPorto Santo Island, Madeira
Period04/11/1704/13/17

Keywords

  • Authentication
  • Caller ID
  • Fake
  • Spoofing
  • Trusted

Fingerprint

Dive into the research topics of 'A mechanism to authenticate caller ID'. Together they form a unique fingerprint.

Cite this