VoIP Networks Performance Analysis with Encryption Systems

The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures with multiple protocols, codecs, software and hardware–based distributions. The use of cryptographic techniques let the users to have a secure communication, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This paper analyzes the VoIP throughput and the QoS parameters with different commercial encryption methods. The measurement–based approach uses lab scenarios to simulate LAN and WAN environments. Security mechanisms such as TLS, SIAX2, SRTP, IPSEC and ZRTP are analyzed with μ-LAW and GSM codecs.




References:
[1] D. Butcher, "Security challenge and defense in VoIP infrastructures"
IEEE Transactions on systems, man, and cybernetics. Vol 37, No. 6, pp
1152-1162, Nov 2007
[2] Clayton, Bradley. "Securing media streams in an Asterisk-based
environment and evaluating the resulting performance cost". Rhode University. Sudafrica. Jan 2007.
[3] I. Baronák, M. Halás, "Mathematical Representation of VoIP Connection Delay", Dept. of Telecommunications, Slovak University of
Technology. Prague, Slovak Republic, April 2008.
[4] Schulzrinne, H., Casner, S., Frederick R., Jacobson, V. "RTP: A Transport Protocol for Real-Time Applications". IETF RFC 3550. July 2003.
[5] Walker, John Q. A. "Handbook for Successful VoIP Deployment:
Network Testing, QoS, and More". NetIQ Corporation. 2002
[6] C. Fernández, G. "Voz sobre IP". Departamento de Investigación,
Universidad de Belgrano. Argentina. Agosto de 2002.
[7] Newport Networks Ltd., "VoIP Bandwidth Calculation". ISDN 91-052- 01-0003-C. 2005.
[8] Gupta, P. Shmatikov, V. VMWare, Inc., Palo Alto. "Security Analysis
of Voice-over-IP Protocols". IEEE, Computer Security Foundations
Symposium,. 2007.
[9] R. Blom, E. Carrara, F. Lindholm, K. Norrman, M. Naslund, Ericsson
Res., Ericsson AB, Stockholm, Sweden. "Conversational IP multimedia
security". IEEEMobile and Wireless Communications Network, 2002.
[10] P. Thermos, A. Takanen. "Securing VoIP networks, Threats, Vulnerabilities, and Countermeasures". Addison Wesley. August 2007.
[11] T. Dierks, E. Rescorla. "The Transport Layer Security (TLS) Protocol
Version 1.1". IETF RFC 4346. April 2006.
[12] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R.
Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol.
IETF RFC 3261, June 2002.
[13] Eren, Evren. Detken, Kai-Oliver. "Voice-over-IP Security Mechanisms
- State_of:the:art, risk assessment, concepts and recommendations".
Chile, 2007.
[14] L. Wang, P. K. Verma, A Network Based Authentication Scheme for
VoIP, School of Electrical and Computer Engineering University of Oklahoma, IEEE, Tulsa, OK, USA.
[15] C. Roberts. "Voice Over IP Security. Centre for Critical Infrastructure Protection". New Zealand. 2005.
[16] M. Baugher, C. McGrew. Naslund, M., Carrara, E., Norrman K. "The
Secure Real-time Transport Protocol (SRTP)". IETF RFC 3711. March
2004.
[17] M. Spencer, Digium, Inc.,B. Capouch, S. J.College, E. Guy,E.
Truphone, F. Miller, Cornfed Systems, LLC,K. Shumard. IAX: Inter-Asterisk eXchange Version 2. RFC 5456, February 2009.
[18] Feng Cao and Saadat Malik, Cisco Systems, Inc. ."Vulnerability
Analysis and Best Practices for Adopting IP Telephony in Critical
Infrastructure Sectors". IEEE Communications Magazine. April 2006.
[19] P. Zimmermann. "ZRTP: Media Path Key Agreement for Secure RTP".
IETF draft. Sept 2008.
[20] E. Kokkonen, M. Matuszewski,. Nokia Res. Center, Helsinki. "Peer-to-
Peer Security for Mobile Real-Time Communications with ZRTP". 5th
IEEE Consumer Communications and Networking Conference, 2008.
[21] S. Tangwongsan, and S. Kassuvan. "A Security Model of Voice Eavesdropping Protection over Digital Networks". proceedings of world academy of science, engineering and technology, volume 20, 2007.
ISSN 1307-6884