Challenges in Securing Voice over IP
IEEE Security and Privacy
IP Easy-pass: a light-weight network-edge resource access control
IEEE/ACM Transactions on Networking (TON)
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Evaluation of a none compressed 12-lead ECG transmission via internet using IPSec
Computers in Biology and Medicine
Critical vpn security analysis and new approach for securing voip communications over vpn networks
Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modeling
Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob?
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Experimental evaluation of community-based WLAN voice and data services
Proceedings of the 3rd international conference on Mobile multimedia communications
Assessing the risk of intercepting VoIP calls
Computer Networks: The International Journal of Computer and Telecommunications Networking
VoIP: A comprehensive survey on a promising technology
Computer Networks: The International Journal of Computer and Telecommunications Networking
End-to-end security and seamless handover solution for real-time communications over 3G networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
A Survey of Voice over IP Security Research
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
The implementation of a secure and pervasive multimodal Web system architecture
Information and Software Technology
VoIP: making secure calls and maintaining high call quality
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
The impact of security on voip call quality
Journal of Mobile Multimedia
Critical analysis and new perspective for securing voice networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
SP 800-58. Security Considerations for Voice Over IP Systems
SP 800-58. Security Considerations for Voice Over IP Systems
Speaker recognition from encrypted VoIP communications
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Transaction-based authentication and key agreement protocol for inter-domain VoIP
Journal of Network and Computer Applications
NEW2AN'07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
Design of service-based systems with adaptive tradeoff between security and service delay
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
In this paper we present the results of the experimentalanalysis of the transmission of voice over securecommunication links implementing IPsec. Criticalparameters characterizing the real-time transmission ofvoice over an IPsec-ured Internet connection, as well astechniques that could be adopted to overcome some of thelimitations of VoIPsec (Voice over IPsec), are presented.Our results show that the effective bandwidth can bereduced up to 50% with respect to VoIP in case ofVoIPsec. Furthermore, we show that the cryptographicengine may hurt the perfomance of voice traffic because ofthe impossibility to schedule the access to it in order toprioritize traffic.We present an efficient solution for packet headercompression, which we call cIPsec, for VoIPsec traffic.Simulation results show that the proposed compressionscheme significantly reduces the overhead of packetheaders, thus increasing the effective bandwidth used bythe transmission. In particular, when cIPsec is adopted,the average packet size is only 2% bigger than in the plaincase (VoIP), which makes VoIPsec and VoIP equivalentfrom the bandwidth usage point of view.