Voice over IPsec: Analysis and Solutions
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
An E-Model Implementation for Speech Quality Evaluation in VoIP Systems
ISCC '05 Proceedings of the 10th IEEE Symposium on Computers and Communications
Critical vpn security analysis and new approach for securing voip communications over vpn networks
Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modeling
Experimental evaluation of community-based WLAN voice and data services
Proceedings of the 3rd international conference on Mobile multimedia communications
Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS
Proceedings of the 2009 ACM symposium on Applied Computing
VoIP: A comprehensive survey on a promising technology
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design of service-based systems with adaptive tradeoff between security and service delay
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP security are already in the market, but these solutions must take into account the real-time constraint of voice service and their mechanisms should address possible attacks and overhead associated with it. One of these solutions is to use IETF IPSec to guarantee confidentiality in order to address security design holes of wireless VoIP networks. This article performs an experimental comparison of the impact of encryption mechanisms on voice speech quality in widely deployed wireless technologies: 802.11 and Bluetooth. Evaluates the upper bound on number of simultaneous VoIP calls which can be placed in a single cell of both networks when security is applied and uses the computational model E-Model to assess quantitatively the quality of service.