VoIP Security: Improving Quality of Service through the Analysis of Secured Transmission

Uchenna Peter Daniel Ani

Abstract


VoIP as a packet switched system is clearly one of the most important evolving trends in computing and telecommunications. However, just like many other new Information technology trends, VoIP introduces both security risks and opportunities for the IT world, viable solutions of which are required. The use of publically verified cryptographic algorithms to ensure confidentiality of VoIP traffic transmitted over insecure public networks as the Internet cannot be overemphasized.  Nonetheless, the uses of cryptographic algorithms yet imposes a delay overhead and packet size overhead on VoIP, which is unconnected to the processing time required to encrypt/decrypt bits or blocks of data and the increase in packet size due the block size of the encryption algorithm. This delay levied is dependent on the mode of operation of the cryptographic algorithms. Mindful of the fact that other components like voice codecs and network bandwidth also contributed delay capabilities on VoIP traffic, and additions of security overheads, there exists a threshold point where an increase in call volume exerts a negative effect on pre-established calls with respect to time and the rate of packet loss. This study sought to determine the combination of cryptographic algorithms, cipher mode and voice codec that holds the uppermost threshold point, before the latency and rate of packet loss of active calls goes past ITU acceptable standards; for one way latency in both plain and encrypted VoIP traffic of 150ms and 200ms respectively and 5% packet loss rate. Through simulation of appropriate scenarios, results indicates that each of the encryption algorithms (AES, DES and 3DES) append additional overhead on the e2e delay and rate of packet loss during VoIP transmission. Also revealing that VoIP-supported codecs are faster and have a higher threshold in terms of  the number of calls before the e2e delay and the rate of packet loss exceeds the acceptable limit for encrypted and plain VoIP e2e delay and packet loss rate.


Keywords


VoIP QoS, VoIP Security, VoIP Encryption, Block Cipher Encryption, Stream Cipher Encryption

Full Text:

PDF

References


B Boguhn. (2009, June) A Compare Business Products Web site. [Online]. http://www.comparebusinessproducts.com/phone-systems/business-voip/voip-named-as-fastest-growing-technology-of-the-past-decade.

N Wittenberg. (2009) Understanding Voice Over IP Technology, Cengage Learning. Document.

D J Wright. (2001) Voice over packet networks. Document.

O Hersent, IP Telephony: Deploying VoIP Protocols and IMS Infrastructure.: John Wiley & Sons, 2010.

M Leggieri and E Gambi, "Quality assessment of secure VoIP communications," in 16th International Conference on Software, Telecommunications and Computer Networks, 2008. SoftCOM 2008, 2008.

J Fischl and H Tschofenig, "Making SIP Make Cents ," Queue, vol. 5, no. 2, pp. 42-49, 2007.

C Shiping and W Xinyuan, "On the anonymity and traceability of peer-to-peer VoIP calls," Network, vol. 20, no. 5, pp. 32-37, 2006.

A S.W Marzuki and C Yu Ka, "Performances analysis of VoIP over 802.11b and 802.11e using different CODECs," in 2010 International Symposium on Communications and Information Technologies (ISCIT), 2010.

N Sulaiman and R Carrasco, "Performance Evaluation of Voice Call over an IP based Network," in 41st Annual Conference on Information Sciences and Systems, 2007. CISS '07, 2007.

M B VoIP. (2005) A Business Voip Website. [Online]. http://mybusinessvoip.com/what-is-voip

K K Tam and H L Goh, "Session Initiation Protocol," in IEEE International Conference on Industrial Technology, IEEE ICIT '02, 2002.

N Kara and V Planat, "Performance analysis of IP multimedia services over HSDPA mobile networks," in Intern ational Conference on IP Multimedia Subsystem Architecture and Applications, 2007, 2007.

D Geneiatakis and T Dagiuklas, "Survey of security vulnerabilities in session initiation protocol," IEEE Communications Surveys & Tutorials, vol. 8, no. 3, pp. 68-81, 2006.

Cisco. (2011) A Cisco Corporation Website. [Online]. http://www.cisco.com/web/about/security/intelligence/securing-voip.html

F Shang and K Sun, "An Efficient MPEG Video Encryption Scheme Based on Chaotic Cipher," in Congress on Image and Signal Processing, 2008. CISP '08, 2008.

O Chung-Ming, "Design of block ciphers by simple chaotic functions," Computational Intelligence Magazine, vol. 3, no. 2, pp. 54-59, 2008.

P Jun and Y Mingying, "Research on a Block Encryption Cipher Based on Chaotic Dynamical System," in Third International Conference on Natural Computation, 2007. (ICNC 2007), 2007.

P Sarkar, "Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher," IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 4025-4037, 2010.

A L Alexander and A L Wijesinha, "An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP," in Third International Conference on Network and System Security, 2009. NSS '09, 2009.

G Paul and S Maitra. (2011) Rc4 Stream Cipher and Its Variants. Document.

Geneiatakis Dimitris, Dagiuklas Tasos, K G, Costas Lambrinoudakis, and Stefanos Gritzalis. (2004) SIP Security Mechanisms: A state-of-the-art review. Document.

D R Wisely, "SIP and Conversational Internet Applications," BT Technology Journal, vol. 19, no. 2, pp. 107-118, 2001.

T Guenkova-Luy and H Schmidt, "Service Mobility with SIP, SDP and MPEG-21," in 9th International Conference on Telecommunications, 2007. ConTel 2007, 2007.

X Mochna, "Simulation of packet losses in video transfers using real-time transport protocol," in 20th International Conference on Radioelektronika (RADIOELEKTRONIKA), 2010, 2010.

L Associates. (2003) An L Associates Website. [Online]. http://www.l1associates.com/VoIP%20Protocols.pdf.

J F Ransome and J W Rittinghouse, "VoIP Security," Elsevie Report 2005.

A Meddahi and H Afifi, ""MOSQoS": Subjective VoIP Quality for Feedback Control and Dynamic QoS Adaptation," in IEEE International Conference on Communications, 2006. ICC '06, 2006.

R M Dansereau and S Jin, "Reducing Packet Loss in CBC Secured VoIP using Interleaved Encryption," in Canadian Conference on Electrical and Computer Engineering, 2006. CCECE '06, 2006.

K Gonia, "Latency and QoS for Voice over IP," SANS Institute, SANS Institute, 21., White Paper 2004.

D. A. C Edward Paul Guillen, "VoIP Networks Performance Analysis with Encryption Systems," World Academy of Science, Engineering and Technology, vol. 58, no. 15, 2009.

M Rawashdeh and A Karmouch, "Seamless video handoff in session mobility over the IMS network," in IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks & Workshops, 2009, 2009.

L Atzori and F Boi, "IP Telephony over Mobile Ad Hoc Networks: Joint Routing and Playout Buffering," in IEEE International Conference on Communications, 2008. ICC '08, 2008.

A Talevski et al., "The Impact of Security on VoIP Call Quality," Mobile Multimedia, vol. 7, no. 1, pp. 113-128, April 2011.

M F Tuysuz and H A Mantar, "Evaluation of cross layer QoS aproachs for improving voice quality over multi-rate WLANs," in 2010 International Conference on Computer Engineering and Systems (ICCES), 2010.

Ashraf D Elbayoumy and Simon J Shepherd, "Stream or Block Cipher for Securing VoIP?," International Journal of Network Security, vol. 5, no. 2, pp. 128–133, September 2007.

A. D. E. a. S. J Shepherd , "Stream or Block Cipher for Securing VoIP?," International Journal of Network Security, vol. 5, no. 2, pp. 128–133, 2007.

Gregory Epiphaniou, Carsten Maple, Paul Sant, and Peter Norrington, "The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729," in 2010 International Conference for Internet Technology and Secured Transactions (ICITST), 2010.

G Epiphaniou, C Maple, P Sant, and P Norrington , "An experimental analysis on iterative block ciphers and their effects on VoIP under different coding schemes," in 2010 International Conference on Signal Processing and Multimedia Applications (SIGMAP), 2010.

Mohammed Mustapha, "Measuring the Security Overhead of Stream and Block Ciphers on SIP-Based VoIP Transmission," Department of Computer Science and Technology, University of Bedfordshire, Bedfordshire, MSc. Thesis 2012.


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)