THE IMPACT OF SECURITY ON VOIP CALL QUALITY
Keywords:
Voice over IP (VoIP), Quality of Service (QoS), data encryptionAbstract
Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP). The QoS is measured in terms of lost packet ratio, latency and jitter using different encryption algorithms, no security and just the use of IP firewalls in Local and Wide Area Networks (LAN and WAN) in the lab and in the real world. The results of laboratory tests indicate that the impact on the overall performance of VoIP depends upon the bandwidth availability and encryption algorithm used. The implementation of any encryption algorithm in low bandwidth environments degrades the voice quality due to increased loss packets and packet latency, but as bandwidth increases encrypted VoIP calls provided better service compared to an unsecured environment.
Downloads
References
Klein, A., Comparison of ciphers. http://www.javamex.com/tutorials/cryptography/ciphers.shtml, Vol. 2009, (2008).
Barnes, Z.A., Is implementation of voice over internet protocol (VoIP) more economical for businesses with large call centers. Bowie State University, (2005).
Santhi, K.R., Kumaran, G.S., Migration to 4G: Mobile IP based solutions. in Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW). IEEE Computer Society, Guadeloupe, French Caribbean, (2006).
Badard, B., Diascorn, V., Boulmier, G., Vicard, A.D., Renard, V., Dimassi, A.H., Migration to VoIP over mobile networks: Technical challenges and economic opportunity analysis. in 14t
International Telecommunications Network Strategy and Planning Symposium (NETWORKS), Warsaw, Poland, (2010), 1-7.
Aire, E.T., Maharaj, B.T., Linde, L.P., Implementation considerations in a SIP based secure voice over IP network. in 7th AFRICON Conference in Africa, Vol. 1, Botswana, (2004), 167-172.
Cisco Systems, Cisco IP communications solutions. http://www.cisco.com/application/pdf/en/us/guest/netsol/ns165/c643/cdccont_090, Vol. 2008, (2005).
Rouse, A., Voice over IP revolutionizing the way businesses communicate. The Communicator, Vol. 1. NetLojix, Available at: http://www.netlojix.com/whitepapers/voip.pdf, (2004).
Talevski, A., Chang, E., Dillon, T., Secure and mobile VoIP. in International Conference on Convergence Information Technology, Korea, (2007), 2108-2113.
Thermos, P., Takanen, A., Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Pearson Education, Inc., Boston, USA, (2008).
Weaver, R., VPN implementations. in Guide to Network Defense and Countermeasures. Thomson Course Technology, USA, (2007), 203-230.
Berson, T., Skype Security Evaluation. http://www.anagram.com/berson/skyeval.pdf. Anagram Laboratories, Palo Alto, USA, (2005).
Zheng, Y., The speed cipher. http://labs.calyptix.com/files/speed-paper.pdf, Vol. 2009, (2009).
Cisco Systems, Understanding delay in packet voice networks. Document Id: 5125, Available at: http://www.cisco.com/application/pdf/paws/5125/delay-details.pdf, Vol. 2008, (2006).
Sulaiman, N., Carrasco, R., Chester, G., Impact of security on voice quality in 3G networks. in 3rd IEEE Conference on Industrial Electronics and Applications (ICIEA), Singapore, (2008), 1583-1587.
Markopoulou, A.P., Tobagi, F.A., Karam, M.J., Assessing the quality of voice communications over internet backbones. IEEE/ACM Transactions on Networking, Vol. 11, (2003), 747-760.
Minasi, M., Locking up the ports: Windows firewall. Mastering Windows Server 2003, Upgrade Edition for SP1 and R2. Sybex, Indianapolis, USA, (2006).
Manousos, M., Apostolacos, S., Grammatikakis, I., Mexis, D., Kagklis, D., Sykas, E., Voice quality monitoring and control for VoIP. IEEE Internet Computing, Vol. 9, (2005), 35- 42.
Nisar, K., Hasbullah, H., Said, A.M., Internet call delay on peer to peer and phone to phone VoIP network. in International Conference on Computer Engineering and Technology (ICCET), Vol. 2, Singapore, (2009), 517-520.
Goode, B., Voice over internet protocol (VoIP). in Proceedings of the IEEE, Vol. 90, (2002), 1495-1517.
Tanenbaum, S., Area network. Computer Networks, Fourth Edition. Prentice Hall, Perth, (2003).
Thanthry, N., Pendse, R., Namuduri, K., Voice over IP security and law enforcement. in 39th Annual International Carnahan Conference on Security Technology (CCST), (2005), 246-250.
Barbieri, R., Bruschi, D., Rosti, E., Voice over IPSec: Analysis and solutions. in 18th Annual Computer Security Applications Conference, San Diego, USA, (2002), 261- 270.
Radmand, P., Singh, J., Domingo, M., Arnedo, J., Talevski, A., VoIP: Making secure calls and maintaining high call quality. in 8th International Conference on Advances in Mobile Computing & Multimedia (MoMM). ACM Press, Paris, France, (2010).
Radmand, P., Talevski, A., Impact of encryption on QoS in VoIP. in 2nd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT). IEEE, Minneapolis, USA, (2010), 721-726.