An Efficient system for improved throughput and delay over VOIP
Omesh Kalambe, Bhagyashri Pokale, Ashwini Meshram "An Efficient system for improved throughput and delay over VOIP". International Journal of Computer Trends and Technology (IJCTT) V44(1):46-49, February 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Voice over Internet Protocol (VoIP) is a growing Communication and Information technology that assists voice communication through the Internet. VoIP is becoming popular due to their cost valuable service and convenience. A VoIP technique has two significant features i.e. Privacy and QoS of the network. Unfortunately, most VoIP network doesn’t offer Privacy as well as QoS to the user. A work has done before on Security and Quality of Services for VoIP applications, yet these issues has not been completely solved. To overcome these issues in VoIP proposed a novel Advanced Encryption Standard (AES) and Secure Hash Algorithm -1 (SHA-1) for Client-Server model. Here, AES and SHA-1 are use to afford secrecy.
References
[1] Zahraa Sabra and Hassan Artail, “Preserving Anonymity and Quality of Service for VoIP Applications over Hybrid Networks,” 17th IEEE Mediterranean Electro technical Conference, Beirut, Lebanon, 13-16, April 2014.
[2] K. Bharathkumar, R. Premalatha Kanikannan, Dr.Rajeswari Mukesh, M.Kasiselvi, T. Kumanan, “Privacy Preserving of VoIP against Peer-to-Peer Network Attacks and Defense,” International Journal of Computer Network and Security (IJCNS) Vol 4. No 1. Jan-Mar 2012 ISSN: 0975-8283.
[3] Mudhakar Srivatsa, Ling Liu and Arun Iyengar, “Preserving Caller Anonymity in Voice-over-IP Networks,” 978-0-7695-3168-7 /08 $25.00 © 2008 IEEE.
[4] Mudhakar Srivatsa, Arun Iyengar, Ling Liu and Hongbo Jiang, “Privacy in VoIP Networks:Flow Analysis Attacks and Defense,” IEEE INFOCOM 2009.
[5] Celia Li and Uyen Trang Nguyen, “Fast- Authentication for Mobile Clients in Wireless Mesh Networks,” 978-1-4244-5377-1/10/$26.00 ©2010 IEEE.
[6] Abdi Wahab, Rizal Broer Bahaweres, Mudrik Alaydrus, Muhaemin, Riyanarto Sarno, “Performance Analysis of VoIP Client with Integrated Encryption Module,” 978-1-4673-2821-0/13/$31.00 ©2013 IEEE.
[7] Pallavi Gangurde, Sanjay Waware, and Dr. Nisha Sarwade, “Simulation of TCP, UDP and SCTP with constant traffic for VOIP services,” Vol. 2, Issue 3, May-Jun 2012, pp.1245-1248.
[8] http://toncar.cz/Tutorials/VoIP/VoIP_Protocols_Introducing_H323.html.
[9] http://www.telecomspace.com/vop-h323.html.
[10] http://www.networkworld.com/article/2332980/lan-wan/what-is-sip-.html.
[11] http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-1/s.
[12] http://www.en.voipforo.com/SIP/SIP_architecture.php.
[13] Monjur Alam and Sonai Ray,”Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach”, International Journal of Network Security, Vol.15, No.6, PP.465-470, Nov. 2013,pp no 465-470
[14] Pallavi Gangurde, Sanjay Waware, and Dr. Nisha Sarwade, “Simulation of TCP, UDP and SCTP with constant traffic for VOIP services,” Vol. 2, Issue 3, May-Jun 2012, pp.1245-1248.
[15] https://en.wikipedia.org/wiki/SHA-1#SHA-0
[16] https://www.google.co.in/url?sa=i& rct=j& q=& esrc=s& source=images&cd=& cad=rja& uact=8& ved=0ahUKEwiKgbzx0bLSAhXLlJQKHVp3Bx4QjRwIBw& url=http%3A%2 %2Fopticalengineering.spiedigitallibrary.org%2Farticle.aspx%3Farticleid%3D1863832& psig=AFQjCNHeTY8VIkvBV1o9MF5f6LYTO6beGw& ust=1488366071531470
Keywords
QoS, VoIP, SHA-1, AES.