Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30184
VoIP Networks Performance Analysis with Encryption Systems

Authors: Edward Paul Guillen, Diego Alejandro Chacon

Abstract:

The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures with multiple protocols, codecs, software and hardware–based distributions. The use of cryptographic techniques let the users to have a secure communication, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This paper analyzes the VoIP throughput and the QoS parameters with different commercial encryption methods. The measurement–based approach uses lab scenarios to simulate LAN and WAN environments. Security mechanisms such as TLS, SIAX2, SRTP, IPSEC and ZRTP are analyzed with μ-LAW and GSM codecs.

Keywords: VoIP, Secure VoIP, Throughput Analysis, VoIP QoS evaluation

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1079050

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2503

References:


[1] D. Butcher, "Security challenge and defense in VoIP infrastructures" IEEE Transactions on systems, man, and cybernetics. Vol 37, No. 6, pp 1152-1162, Nov 2007
[2] Clayton, Bradley. "Securing media streams in an Asterisk-based environment and evaluating the resulting performance cost". Rhode University. Sudafrica. Jan 2007.
[3] I. Baronák, M. Halás, "Mathematical Representation of VoIP Connection Delay", Dept. of Telecommunications, Slovak University of Technology. Prague, Slovak Republic, April 2008.
[4] Schulzrinne, H., Casner, S., Frederick R., Jacobson, V. "RTP: A Transport Protocol for Real-Time Applications". IETF RFC 3550. July 2003.
[5] Walker, John Q. A. "Handbook for Successful VoIP Deployment: Network Testing, QoS, and More". NetIQ Corporation. 2002
[6] C. Fernández, G. "Voz sobre IP". Departamento de Investigación, Universidad de Belgrano. Argentina. Agosto de 2002.
[7] Newport Networks Ltd., "VoIP Bandwidth Calculation". ISDN 91-052- 01-0003-C. 2005.
[8] Gupta, P. Shmatikov, V. VMWare, Inc., Palo Alto. "Security Analysis of Voice-over-IP Protocols". IEEE, Computer Security Foundations Symposium,. 2007.
[9] R. Blom, E. Carrara, F. Lindholm, K. Norrman, M. Naslund, Ericsson Res., Ericsson AB, Stockholm, Sweden. "Conversational IP multimedia security". IEEEMobile and Wireless Communications Network, 2002.
[10] P. Thermos, A. Takanen. "Securing VoIP networks, Threats, Vulnerabilities, and Countermeasures". Addison Wesley. August 2007.
[11] T. Dierks, E. Rescorla. "The Transport Layer Security (TLS) Protocol Version 1.1". IETF RFC 4346. April 2006.
[12] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol. IETF RFC 3261, June 2002.
[13] Eren, Evren. Detken, Kai-Oliver. "Voice-over-IP Security Mechanisms - State_of:the:art, risk assessment, concepts and recommendations". Chile, 2007.
[14] L. Wang, P. K. Verma, A Network Based Authentication Scheme for VoIP, School of Electrical and Computer Engineering University of Oklahoma, IEEE, Tulsa, OK, USA.
[15] C. Roberts. "Voice Over IP Security. Centre for Critical Infrastructure Protection". New Zealand. 2005.
[16] M. Baugher, C. McGrew. Naslund, M., Carrara, E., Norrman K. "The Secure Real-time Transport Protocol (SRTP)". IETF RFC 3711. March 2004.
[17] M. Spencer, Digium, Inc.,B. Capouch, S. J.College, E. Guy,E. Truphone, F. Miller, Cornfed Systems, LLC,K. Shumard. IAX: Inter-Asterisk eXchange Version 2. RFC 5456, February 2009.
[18] Feng Cao and Saadat Malik, Cisco Systems, Inc. ."Vulnerability Analysis and Best Practices for Adopting IP Telephony in Critical Infrastructure Sectors". IEEE Communications Magazine. April 2006.
[19] P. Zimmermann. "ZRTP: Media Path Key Agreement for Secure RTP". IETF draft. Sept 2008.
[20] E. Kokkonen, M. Matuszewski,. Nokia Res. Center, Helsinki. "Peer-to- Peer Security for Mobile Real-Time Communications with ZRTP". 5th IEEE Consumer Communications and Networking Conference, 2008.
[21] S. Tangwongsan, and S. Kassuvan. "A Security Model of Voice Eavesdropping Protection over Digital Networks". proceedings of world academy of science, engineering and technology, volume 20, 2007. ISSN 1307-6884