7,164 research outputs found
Secure VoIP Performance Measurement
This project presents a mechanism for instrumentation of secure VoIP calls. The experiments were run under different network conditions and security systems. VoIP services such as Google Talk, Express Talk and Skype were under test. The project allowed analysis of the voice quality of the VoIP services based on the Mean Opinion Score (MOS) values generated by Perceptual valuation of Speech Quality (PESQ). The quality of the audio streams
produced were subjected to end-to-end delay, jitter, packet loss and extra processing in the networking hardware and end devices due to Internetworking Layer security or Transport Layer
security implementations. The MOS values were mapped to Perceptual Evaluation of Speech Quality for wideband (PESQ-WB) scores. From these PESQ-WB scores, the graphs of the mean of 10 runs and box and whisker plots for each parameter were drawn. Analysis on the graphs was performed in order to deduce the quality of each VoIP service. The E-model was
used to predict the network readiness and Common vulnerability Scoring System (CVSS) was used to predict the network vulnerabilities. The project also provided the mechanism to measure the throughput for each test case. The overall performance of each VoIP service was determined by PESQ-WB scores, CVSS scores and the throughput. The experiment demonstrated the relationship among VoIP performance, VoIP security and VoIP service type. The experiment also suggested that, when compared to an unsecure IPIP tunnel, Internetworking
Layer security like IPSec ESP or Transport Layer security like OpenVPN TLS would improve
a VoIP security by reducing the vulnerabilities of the media part of the VoIP signal. Morever,
adding a security layer has little impact on the VoIP voice quality
AN ANALYSIS OF VOICE OVER INTERNET PROTOCOL (VOIP) AND ITS SECURITY IMPLEMENTATION
Voice over Internet Protocol (VoIP) has been in existence for a number of years but only
quite recently has it developed into mass adoption. As VoIP technology penetrates
worldwide telecommunications markets, the advancements achieved in performance, cost
reduction, and feature supportmake VoIP a convincingproposition for service providers,
equipment manufacturers, and end users. Since the introduction of mass-market VoIP
services over broadband Internet in 2004, security and safeguarding are becoming a more
important obligation in VoIP solutions. The purpose of this final year project is to study
and analyze VoIP and implement the security aspect using Secure Real-time Transport
Protocol (SRTP) end-to-end media encryption in the Universiti Teknologi PETRONAS
(UTP) laboratory. Extensive research, evaluation of case studies, literature reviews,
network analysis, as well as testing and experimentation are the methods employed in
achieving a secure and reliable VoIP network. With the given time frame and adequate
resources, the study and analysis of VoIP and implementation of SRTP should prove to
be very successful
Performance of VoIP with DCCP for satellite links
We present experimental results for the performance of selected voice codecs using the Datagram Congestion Control Protocol (DCCP) with TCP-Friendly Rate Control (TFRC) congestion control mechanism over a satellite link. We evaluate the performance of both constant and variable data rate speech codecs (G.729, G.711 and Speex) for a number of simultaneous calls, using the ITU E-model and identify problem areas and potential for improvement. Our experiments are done on a commercial satellite service using a data stream generated by a VoIP application,
configured with selected voice codecs and using the DCCP/CCID4 Linux implementation. We analyse the sources of packet losses which are a main contributor to reduced
voice quality when using CCID4 and additionally analyse the
effect of jitter which is one of the crucial parameters contributing to VoIP quality and has, to the best of our knowledge, not been considered previously in the published DCCP performance results. We propose modifications to the CCID4 algorithm and demonstrate how these improve the VoIP performance, without the need for additional link information other than what is already monitored by CCID4 (which is the case for Quick-Start). We also demonstrate the fairness of the proposed modifications to other flows. We identify the additional benefit of DCCP when used in VoIP admission control mechanisms and draw conclusions
about the advantages and disadvantages of the proposed
DCCP/ CCID4 congestion control mechanism for use with VoIP
applications
On the quality of VoIP with DCCP for satellite communications
We present experimental results for the performance of selected voice codecs using DCCP with CCID4 congestion control over a satellite link. We evaluate the performance of both constant and variable data rate speech codecs for a number of simultaneous calls using the ITU E-model. We analyse the sources of packet losses and additionally analyse the effect of jitter which is one of the crucial parameters contributing to VoIP quality and has, to the best of our knowledge, not been considered previously in the published DCCP performance results. We propose modifications to the CCID4 algorithm and demonstrate how these improve the VoIP performance, without the need for additional link information other than what is already monitored by CCID4. We also demonstrate the fairness of the proposed modifications to other flows. Although the recently adopted changes to TFRC specification alleviate some of the performance issues for VoIP on satellite links, we argue that the characteristics of commercial satellite links necessitate consideration of further improvements. We identify the additional benefit of DCCP when used in VoIP admission control mechanisms and draw conclusions about the advantages and disadvantages of the proposed DCCP/CCID4 congestion control mechanism for use with VoIP applications
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and
popular way of communicating for Internet users. This also applies to
Peer-to-Peer (P2P) systems and merging these two have already proven to be
successful (e.g. Skype). Even the existing standards of VoIP provide an
assurance of security and Quality of Service (QoS), however, these features are
usually optional and supported by limited number of implementations. As a
result, the lack of mandatory and widely applicable QoS and security guaranties
makes the contemporary VoIP systems vulnerable to attacks and network
disturbances. In this paper we are facing these issues and propose the SecMon
system, which simultaneously provides a lightweight security mechanism and
improves quality parameters of the call. SecMon is intended specially for VoIP
service over P2P networks and its main advantage is that it provides
authentication, data integrity services, adaptive QoS and (D)DoS attack
detection. Moreover, the SecMon approach represents a low-bandwidth consumption
solution that is transparent to the users and possesses a self-organizing
capability. The above-mentioned features are accomplished mainly by utilizing
two information hiding techniques: digital audio watermarking and network
steganography. These techniques are used to create covert channels that serve
as transport channels for lightweight QoS measurement's results. Furthermore,
these metrics are aggregated in a reputation system that enables best route
path selection in the P2P network. The reputation system helps also to mitigate
(D)DoS attacks, maximize performance and increase transmission efficiency in
the network.Comment: Paper was presented at 7th international conference IBIZA 2008: On
Computer Science - Research And Applications, Poland, Kazimierz Dolny
31.01-2.02 2008; 14 pages, 5 figure
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP
(Session Initiation Protocol) that can be used for creating covert channels
during signaling phase of VoIP (Voice over IP) call. Apart from characterizing
existing steganographic methods we provide new insights by introducing new
techniques. We also estimate amount of data that can be transferred in
signalling messages for typical IP telephony call.Comment: 8 pages, 4 figure
Final report on the evaluation of RRM/CRRM algorithms
Deliverable public del projecte EVERESTThis deliverable provides a definition and a complete evaluation of the RRM/CRRM algorithms selected in D11 and D15, and evolved and refined on an iterative process. The evaluation will be carried out by means of simulations using the simulators provided at D07, and D14.Preprin
MIPv6 Experimental Evaluation using Overlay Networks
The commercial deployment of Mobile IPv6 has been hastened by the concepts of Integrated
Wireless Networks and Overlay Networks, which are present in the notion of the
forthcoming generation of wireless communications. Individual wireless access networks
show limitations that can be overcome through the integration of different technologies
into a single unified platform (i.e., 4G systems). This paper summarises practical experiments
performed to evaluate the impact of inter-networking (i.e. vertical handovers) on
the Network and Transport layers. Based on our observations, we propose and evaluate a
number of inter-technology handover optimisation techniques, e.g., Router Advertisements
frequency values, Binding Update simulcasting, Router Advertisement caching, and Soft
Handovers. The paper concludes with the description of a policy-based mobility support
middleware (PROTON) that hides 4G networking complexities from mobile users, provides
informed handover-related decisions, and enables the application of different vertical
handover methods and optimisations according to context.Publicad
- …