SlideShare uma empresa Scribd logo
1 de 20
Performance Analysis of VoIP Client with
     Integrated Encryption Module




              ICCSPA 13

                                1
Research     Result and     Conclusion and
Introduction   Literature Review
                                   Methodology   Discussion    Recommendation




                                    Integrate
                                     Sipdroid
Background                             with      Packet Loss
                                   Encryption
                                     Module


                                    Modified
 Research                           Sipdroid
                                                   Delay
 Purpose                            activity
                                    diagram




 Research                           Testing
                                                 Throughput
 Question                           Scenario




                                                                2
BackGround

                                                    Send and
                                                    receiving Email




                                                    Teleconference
                                                    

                                                    & VoIP




Source: http://publikasi.kominfo.go.id (2011)   3
BackGround

   Internet users are increasing in Indonesia
    based on the results of a survey of
    Communication and Information Technology
    in 2011 has increased very rapidly once.
    The largest percentage of 97.69% used the
    Internet to send and receive email, while
    the lowest is the promotion of the hotel
    followed by VoIP with each percentage of
    0.14% and 13.5444% [1].




                                   4
Research Purpose

Purpose of this research is
 to integrate security features or modules or

  data encryption using multiple encryption
  methods such as AES, DES or RC4 on
  Sipdroid VoIP client when communicate
  through VoIP.
 to measure the performance of the VoIP

  client that has integrated security or
  encryption modules.



                                   5
Research Question (RQ)

The formulation of problem can be determined
  in this study are as follows:
• How to integrate a VoIP client running on
  smarthphone or mobile-based encryption
  module? (RQ1)
• How to measure the performance of mobile-
  based VoIP client that has been integrated
  with the encryption module? (RQ2)




                                 6
LITERATURE REVIEW




               7
Research Methodology




                 8
The correlation between the
methods, devices, parameters and
No  Methods /
    Techniques
                 results
               devices Parameter result

1.        Making               JCE            Lock, Data        Encryption Module
     encryption scheme                                           with AES, DES,
      AES, DES, RC4                                                    RC4.
2.        Sipdroid         Encryption                           Sipdroid integrated
      Integration with    Module, Source                         with encryption
        Encryption          Sipdroid                                 features.
          Module
3.    Making Network        Smartphone                            Test bed VoIP
          Test Bed        Android, VoIP                             network
                            Server with
                             Asterisk
4.   Testing Sipdroid      Test bed VoIP           Data            Testing Data
     with encryption     network, Android    confidentiality,    Security Service.
      features using       Smartphone,        data integrity,
     Security Service.       Wireshark         availability

5.     Performance        Wireshark, Test    Delay, packet        Performance
       measurement       bed VoIP network, loss, throughput,    measurement data
       Sipdroid with          Android            MOS.               Sipdroid
        encryption        Smartphone, the
         features.            survey.                              9
Integrate Sipdroid with Encryption
             Module




                         10
Modified Sipdroid activity diagram




                         11
Design of VoIP Test Bed




                    12
Testing Scenario


   Quality of Services ( QoS )
       Packet loss
       Delay
       Throughput




                                   13
QoS Testing Result

   Packet Loss




                             14
QoS Testing Result

   Delay




                             15
QoS Testing Result

   Throughput




                            16
Conclusion ……..(1)


• The encryption module generated from JCE
  encryption can be integrated well with
  Sipdroid by encrypting the RTP payload to
  be transmitted on a VoIP network.
• Measurement performance of security
  service for Sipdroid integrated with
  encryption module can be done well. It
  indicates that the integrated encryption
  module work well.




                                 17
Conclusion ……..(2)


• QoS result from this measurement produce
  enlarged delay more than 0.01 ms for
  Sipdroid integrated with encryption module,
  mean while for packet loss and throughput
  there are no significance changes.
• Sipdroid with encryption module can
  overcome passive attack, because captured
  communication data by Wireshark can not
  be decoded well, this happen due to the
  encryption process in data.


                                  18
Recommendations

• Fixing the sound quality from Sipdroid
  integrated with encryption module.
• Adding a module to know encryption
  scheme in the beginning of VoIP
  communications.
• Analyze the payload data from encrypted
  RTP.
• Simulate an attack on Sipdroid integrated
  with encryption module.



                                  19
Thank You




            20

Mais conteúdo relacionado

Mais procurados

Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security
 
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmDual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmIJARIIT
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
IEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesIEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesSrinivasan Natarajan
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp Security[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp SecurityCarles Farré
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?Stephen Kho
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET Journal
 
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
A  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EEA  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EE
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EEIJCI JOURNAL
 
Geir Making the leap to ipv6 final
Geir Making the leap to ipv6 finalGeir Making the leap to ipv6 final
Geir Making the leap to ipv6 finalIPv6no
 
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika WijayatungaIndonesia Network Operators Group
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentationhlksd
 
Network security dotnet
Network security   dotnetNetwork security   dotnet
Network security dotnetDhamu Mca
 
5G Cellular D2D RDMA Clusters
5G Cellular D2D RDMA Clusters5G Cellular D2D RDMA Clusters
5G Cellular D2D RDMA ClustersYitzhak Bar-Geva
 

Mais procurados (20)

Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
D2 d wifi
D2 d wifiD2 d wifi
D2 d wifi
 
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentation
 
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmDual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA Algorithm
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
IEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesIEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titles
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp Security[DSBW Spring 2009] Unit 08: WebApp Security
[DSBW Spring 2009] Unit 08: WebApp Security
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
Steganography
SteganographySteganography
Steganography
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
 
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
A  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EEA  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EE
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
 
Geir Making the leap to ipv6 final
Geir Making the leap to ipv6 finalGeir Making the leap to ipv6 final
Geir Making the leap to ipv6 final
 
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
10 (IDNOG01) Introduction about ICANN by Champika Wijayatunga
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentation
 
Network security dotnet
Network security   dotnetNetwork security   dotnet
Network security dotnet
 
5G Cellular D2D RDMA Clusters
5G Cellular D2D RDMA Clusters5G Cellular D2D RDMA Clusters
5G Cellular D2D RDMA Clusters
 

Semelhante a Performance Analysis of VoIP Client with Integrated Encryption Module

Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aPerformance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aRizal Broer
 
Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aPerformance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aRizal Broer
 
Introduction to Fog
Introduction to FogIntroduction to Fog
Introduction to FogCisco DevNet
 
Cisco Multi-Service FAN Solution
Cisco Multi-Service FAN SolutionCisco Multi-Service FAN Solution
Cisco Multi-Service FAN SolutionCisco DevNet
 
s2c-success-story-sirius.pdf
s2c-success-story-sirius.pdfs2c-success-story-sirius.pdf
s2c-success-story-sirius.pdfS2C Limited
 
Rebaca Technologies Corporate Overview
Rebaca Technologies Corporate OverviewRebaca Technologies Corporate Overview
Rebaca Technologies Corporate OverviewAvishek Gupta
 
Rebaca Technologies Corporate Overview
Rebaca Technologies Corporate OverviewRebaca Technologies Corporate Overview
Rebaca Technologies Corporate OverviewAvishek Gupta
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networksinside-BigData.com
 
Voip Eddie Jan2010
Voip Eddie Jan2010Voip Eddie Jan2010
Voip Eddie Jan2010ekaypour
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage1crore projects
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...IRJET Journal
 
The Current And Future State Of Service Mesh
The Current And Future State Of Service MeshThe Current And Future State Of Service Mesh
The Current And Future State Of Service MeshRam Vennam
 
Sagar_Ware_Resume
Sagar_Ware_ResumeSagar_Ware_Resume
Sagar_Ware_ResumeSagar Ware
 
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...GoGrid Cloud Hosting
 
API 102: Programming with Meraki APIs
API 102: Programming with Meraki APIsAPI 102: Programming with Meraki APIs
API 102: Programming with Meraki APIsJoel W. King
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelesssierradeveloper
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 

Semelhante a Performance Analysis of VoIP Client with Integrated Encryption Module (20)

Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aPerformance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11a
 
Performance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11aPerformance analysis vo_ip_client_integrated_encryption_module11a
Performance analysis vo_ip_client_integrated_encryption_module11a
 
Pro Viva Emmanuel
Pro Viva EmmanuelPro Viva Emmanuel
Pro Viva Emmanuel
 
Testing
TestingTesting
Testing
 
Introduction to Fog
Introduction to FogIntroduction to Fog
Introduction to Fog
 
Cisco Multi-Service FAN Solution
Cisco Multi-Service FAN SolutionCisco Multi-Service FAN Solution
Cisco Multi-Service FAN Solution
 
s2c-success-story-sirius.pdf
s2c-success-story-sirius.pdfs2c-success-story-sirius.pdf
s2c-success-story-sirius.pdf
 
Rebaca Technologies Corporate Overview
Rebaca Technologies Corporate OverviewRebaca Technologies Corporate Overview
Rebaca Technologies Corporate Overview
 
Rebaca Technologies Corporate Overview
Rebaca Technologies Corporate OverviewRebaca Technologies Corporate Overview
Rebaca Technologies Corporate Overview
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
Voip Eddie Jan2010
Voip Eddie Jan2010Voip Eddie Jan2010
Voip Eddie Jan2010
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
 
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
 
R43019698
R43019698R43019698
R43019698
 
The Current And Future State Of Service Mesh
The Current And Future State Of Service MeshThe Current And Future State Of Service Mesh
The Current And Future State Of Service Mesh
 
Sagar_Ware_Resume
Sagar_Ware_ResumeSagar_Ware_Resume
Sagar_Ware_Resume
 
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...
GoGrid 3.0 Webinar: Complex Infrastructure Made Easy - Learn About the GoGrid...
 
API 102: Programming with Meraki APIs
API 102: Programming with Meraki APIsAPI 102: Programming with Meraki APIs
API 102: Programming with Meraki APIs
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 

Performance Analysis of VoIP Client with Integrated Encryption Module

  • 1. Performance Analysis of VoIP Client with Integrated Encryption Module ICCSPA 13 1
  • 2. Research Result and Conclusion and Introduction Literature Review Methodology Discussion Recommendation Integrate Sipdroid Background with Packet Loss Encryption Module Modified Research Sipdroid Delay Purpose activity diagram Research Testing Throughput Question Scenario 2
  • 3. BackGround Send and receiving Email Teleconference  & VoIP Source: http://publikasi.kominfo.go.id (2011) 3
  • 4. BackGround  Internet users are increasing in Indonesia based on the results of a survey of Communication and Information Technology in 2011 has increased very rapidly once.  The largest percentage of 97.69% used the Internet to send and receive email, while the lowest is the promotion of the hotel followed by VoIP with each percentage of 0.14% and 13.5444% [1]. 4
  • 5. Research Purpose Purpose of this research is  to integrate security features or modules or data encryption using multiple encryption methods such as AES, DES or RC4 on Sipdroid VoIP client when communicate through VoIP.  to measure the performance of the VoIP client that has integrated security or encryption modules. 5
  • 6. Research Question (RQ) The formulation of problem can be determined in this study are as follows: • How to integrate a VoIP client running on smarthphone or mobile-based encryption module? (RQ1) • How to measure the performance of mobile- based VoIP client that has been integrated with the encryption module? (RQ2) 6
  • 9. The correlation between the methods, devices, parameters and No Methods / Techniques results devices Parameter result 1. Making JCE Lock, Data Encryption Module encryption scheme with AES, DES, AES, DES, RC4 RC4. 2. Sipdroid Encryption Sipdroid integrated Integration with Module, Source with encryption Encryption Sipdroid features. Module 3. Making Network Smartphone Test bed VoIP Test Bed Android, VoIP network Server with Asterisk 4. Testing Sipdroid Test bed VoIP Data Testing Data with encryption network, Android confidentiality, Security Service. features using Smartphone, data integrity, Security Service. Wireshark availability 5. Performance Wireshark, Test Delay, packet Performance measurement bed VoIP network, loss, throughput, measurement data Sipdroid with Android MOS. Sipdroid encryption Smartphone, the features. survey. 9
  • 10. Integrate Sipdroid with Encryption Module 10
  • 12. Design of VoIP Test Bed 12
  • 13. Testing Scenario  Quality of Services ( QoS )  Packet loss  Delay  Throughput 13
  • 14. QoS Testing Result  Packet Loss 14
  • 16. QoS Testing Result  Throughput 16
  • 17. Conclusion ……..(1) • The encryption module generated from JCE encryption can be integrated well with Sipdroid by encrypting the RTP payload to be transmitted on a VoIP network. • Measurement performance of security service for Sipdroid integrated with encryption module can be done well. It indicates that the integrated encryption module work well. 17
  • 18. Conclusion ……..(2) • QoS result from this measurement produce enlarged delay more than 0.01 ms for Sipdroid integrated with encryption module, mean while for packet loss and throughput there are no significance changes. • Sipdroid with encryption module can overcome passive attack, because captured communication data by Wireshark can not be decoded well, this happen due to the encryption process in data. 18
  • 19. Recommendations • Fixing the sound quality from Sipdroid integrated with encryption module. • Adding a module to know encryption scheme in the beginning of VoIP communications. • Analyze the payload data from encrypted RTP. • Simulate an attack on Sipdroid integrated with encryption module. 19
  • 20. Thank You 20