260 for payload of 40 bytes. For G.723.1 (6.3 kbps)
and AES with HMAC-SHA1 the area of feasible VoIP
calls has been reduced to 0-160 for payload size of
24 bytes and 1-240 for payload size of 48 bytes.
The dropping rates were almost double than those
recorded with DES/3DES and HMAC-SHA1. In gen-
eral, the crypto-engine seems to perform better with
large payload sizes and, in the majority of the cases
examined, the default payload size shipped with each
codec, is not the appropriate selection when encryp-
tion is concerned.
ACKNOWLEDGEMENTS
Special thanks must go to Nikolaos Pavlidis, from
Information Services Directorate, University of Bed-
fordshire, Dr. Peter Norrington from the Centre for
Excellence in Teaching & Learning (CETL) at the
University of Bedfordshire as well as Dr. Helen Ja-
cobs (Modern-Networks) for all the valuable support
and fruitful ideas during the implementation of this
work. Finally, acknowledgement must be credited to
Engineering and Physical Sciences Research Council
(EPSRC) for the financial support of this project.
REFERENCES
Barbieri, R., Bruschi, D., and Rosti, E. (2002). Voice over
ipsec: Analysis and solutions. Computer Security Ap-
plications Conference, Annual, 0:261.
Benvenuto, M. C. and Keromytis, A. D. (2003). Easyvpn:
Ipsec remote access made easy. In LISA ’03: Proceed-
ings of the 17th USENIX conference on System admin-
istration, pages 87–94, Berkeley, CA, USA. USENIX
Association.
Bohnert, T. and Monteiro, E. (2005). A comment on
simulating lrd traffic with pareto on/off sources. In
CoNEXT ’05: Proceedings of the 2005 ACM confer-
ence on Emerging network experiment and technol-
ogy, pages 228–229, New York, NY, USA. ACM.
Braden, B., Clark, D., Crowcroft, J., Davie, B., Deering, S.,
Estrin, D., Floyd, S., Jacobson, V., Minshall, G., Par-
tridge, C., Peterson, L., Ramakrishnan, K., Shenker,
S., Wroclawski, J., and Zhang, L. (1998). Recom-
mendations on Queue Management and Congestion
Avoidance in the Internet. RFC 2309 (Informational).
Elbayoumy, A. D. and Shepherd, S. J. (2005). Using the tiny
encryption algorithm for securing voice over ip. In
Proceedings of 7th Annual International Symposium
on Advanced Radio Technologies. INSTICC Press.
Elbayoumy, A. D. and Shepherd, S. J. (2007). Stream or
block cipher for securing voip? I. J. Network Security,
5(2):128–133.
Elkeelany, O., Matalgah, M., Sheikh, K., Thaker, M.,
Chaudhry, G., Medhi, D., and Qaddour, J. (2002). Per-
formance analysis of ipsec protocol: encryption and
authentication. ICC, 2(2):3225–3241.
It, U. (1993). ITU-T recommendation G.114. Technical
report, International Telecommunication Union.
Kuhn, D. R., Walsh, T., Fries, S., of Standards, N. I., and
(U.S.), T. (2005). Security considerations for voice
over IP systems [electronic resource] : recommenda-
tions of the National Institute of Standards and Tech-
nology / D. Richard Kuhn, Thomas J. Walsh, Steffen
Fries. U.S. Dept. of Commerce, Technology Admin-
istration, National Institute of Standards and Technol-
ogy, Gaithersburg, MD :.
Li, I.-H. (2008). Effects of on-off variability in two-state
pareto traffic models on multimedia application trans-
mission performance. Networked Computing and Ad-
vanced Information Management, International Con-
ference on, 2:426–431.
NS2 (2001). The Network Simulator ns-2 (v2.1b8a).
http://www.isi.edu/nsnam/ns/.
Press, C. (2006 (accessed September 23, 2009)).
Voice over IP Per Call Bandwidth Consumption.
http://www.cisco.com/warp/public/788/pkt-voice-
general/bwidth consume.pdf.
Radia, P. and Kaufman, C. (2000). Key exchange in ipsec:
Analysis of ike. IEEE Internet Computing, 4:50–56.
Xenakis, C., Laoutaris, N., Merakos, L., and Stavrakakis,
I. (2006). A generic characterization of the overheads
imposed by ipsec and associated cryptographic algo-
rithms. Comput. Netw., 50(17):3225–3241.
AN EXPERIMENTAL ANALYSIS ON ITERATIVE BLOCK CIPHERS AND THEIR EFFECTS ON VOIP UNDER
DIFFERENT CODING SCHEMES
25