AN EXPERIMENTAL ANALYSIS ON ITERATIVE BLOCK CIPHERS AND THEIR EFFECTS ON VOIP UNDER DIFFERENT CODING SCHEMES

Gregory Epiphaniou, Carsten Maple, Paul Sant, Matthew Reeve

Abstract

IP telephony (IPTel) refers to the technology to transport real-time media over an IP network. This technology is considered as the key to providing advanced communication for end users at an affordable price whilst also assuring significant cost savings for the Internet Telephony Service Providers (ITSP). As with adoption of any new technology, utilizing VoIP is not without its risks. Digitizing voice that can be routed through hostile environments such as packet switched networks makes VoIP vulnerable to all of the risks of an IP network including viruses, Denial of Service (DOS) attacks and conversation eavesdropping. This paper focuses on the effects of iterative block ciphers on VoIP traffic in terms of average end-to-end delay and packet loss rates. We have tested the majority of voice codecs as well as all the variable payload sizes they can support. Finally, the simulations have been carried out by using the NS-2 network simulator.

References

  1. Barbieri, R., Bruschi, D., and Rosti, E. (2002). Voice over ipsec: Analysis and solutions. Computer Security Applications Conference, Annual, 0:261.
  2. Benvenuto, M. C. and Keromytis, A. D. (2003). Easyvpn: Ipsec remote access made easy. In LISA 7803: Proceedings of the 17th USENIX conference on System administration, pages 87-94, Berkeley, CA, USA. USENIX Association.
  3. Bohnert, T. and Monteiro, E. (2005). A comment on simulating lrd traffic with pareto on/off sources. In CoNEXT 7805: Proceedings of the 2005 ACM conference on Emerging network experiment and technology, pages 228-229, New York, NY, USA. ACM.
  4. Braden, B., Clark, D., Crowcroft, J., Davie, B., Deering, S., Estrin, D., Floyd, S., Jacobson, V., Minshall, G., Partridge, C., Peterson, L., Ramakrishnan, K., Shenker, S., Wroclawski, J., and Zhang, L. (1998). Recommendations on Queue Management and Congestion Avoidance in the Internet. RFC 2309 (Informational).
  5. Elbayoumy, A. D. and Shepherd, S. J. (2005). Using the tiny encryption algorithm for securing voice over ip. In Proceedings of 7th Annual International Symposium on Advanced Radio Technologies. INSTICC Press.
  6. Elbayoumy, A. D. and Shepherd, S. J. (2007). Stream or block cipher for securing voip? I. J. Network Security, 5(2):128-133.
  7. Elkeelany, O., Matalgah, M., Sheikh, K., Thaker, M., Chaudhry, G., Medhi, D., and Qaddour, J. (2002). Performance analysis of ipsec protocol: encryption and authentication. ICC, 2(2):3225-3241.
  8. It, U. (1993). ITU-T recommendation G.114. Technical report, International Telecommunication Union.
  9. Kuhn, D. R., Walsh, T., Fries, S., of Standards, N. I., and (U.S.), T. (2005). Security considerations for voice over IP systems [electronic resource] : recommendations of the National Institute of Standards and Technology / D. Richard Kuhn, Thomas J. Walsh, Steffen Fries. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Gaithersburg, MD :.
  10. Li, I.-H. (2008). Effects of on-off variability in two-state pareto traffic models on multimedia application transmission performance. Networked Computing and Advanced Information Management, International Conference on, 2:426-431.
  11. NS2 (2001). The Network Simulator ns-2 (v2.1b8a). http://www.isi.edu/nsnam/ns/.
  12. C. (2006 (accessed September 23, 2009)).
  13. http://www.cisco.com/warp/public/788/pkt-voicegeneral/bwidth consume.pdf.
  14. Radia, P. and Kaufman, C. (2000). Key exchange in ipsec: Analysis of ike. IEEE Internet Computing, 4:50-56.
  15. Xenakis, C., Laoutaris, N., Merakos, L., and Stavrakakis, I. (2006). A generic characterization of the overheads imposed by ipsec and associated cryptographic algorithms. Comput. Netw., 50(17):3225-3241.
Download


Paper Citation


in Harvard Style

Epiphaniou G., Maple C., Sant P. and Reeve M. (2010). AN EXPERIMENTAL ANALYSIS ON ITERATIVE BLOCK CIPHERS AND THEIR EFFECTS ON VOIP UNDER DIFFERENT CODING SCHEMES . In Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2010) ISBN 978-989-8425-19-5, pages 17-25. DOI: 10.5220/0002930000170025


in Bibtex Style

@conference{sigmap10,
author={Gregory Epiphaniou and Carsten Maple and Paul Sant and Matthew Reeve},
title={AN EXPERIMENTAL ANALYSIS ON ITERATIVE BLOCK CIPHERS AND THEIR EFFECTS ON VOIP UNDER DIFFERENT CODING SCHEMES},
booktitle={Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2010)},
year={2010},
pages={17-25},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002930000170025},
isbn={978-989-8425-19-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2010)
TI - AN EXPERIMENTAL ANALYSIS ON ITERATIVE BLOCK CIPHERS AND THEIR EFFECTS ON VOIP UNDER DIFFERENT CODING SCHEMES
SN - 978-989-8425-19-5
AU - Epiphaniou G.
AU - Maple C.
AU - Sant P.
AU - Reeve M.
PY - 2010
SP - 17
EP - 25
DO - 10.5220/0002930000170025