1 / 12

Investigation of VoIP Quality of Service using SRTP Protocol

Investigation of VoIP Quality of Service using SRTP Protocol. ELECTRONICS AND ELECTRICAL ENGINEERING Author: T . Adomkus , E. Kalvaitis. Outline. Introduction MIKEY Simulation Results Conclusion. Introduction. VoIP has a very special characteristic: it is “time critical”.

milo
Télécharger la présentation

Investigation of VoIP Quality of Service using SRTP Protocol

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Investigation of VoIP Quality of Service using SRTP Protocol ELECTRONICS AND ELECTRICAL ENGINEERING Author: T. Adomkus, E. Kalvaitis

  2. Outline • Introduction • MIKEY • Simulation Results • Conclusion

  3. Introduction • VoIP has a very special characteristic: it is “time critical”. • The technology requires a very low latency less than 150 ms. • Packet loss cannot exceed the mark of 3% . • The technology is highly sensitive to “unquantifiable disrupting factors such as jitter”.

  4. MIKEY • MIKEY(Multimedia Internet KEYing) is another key exchange protocol for SRTP. • Pre-shared key • Public-Key • Diffie-Hellman

  5. MIKEY • Pre-shared key (PSK) • This is the most efficient way to handle the transport of the Common Secret, since only symmetric encryption is used and only a small amount of data has to be exchanged.

  6. MIKEY Cont. • Public-key • The Common Secret is exchanged with the help of public key encryption. In larger systems, this requires a PKI to handle the secure distribution of public keys.

  7. MIKEY Cont. • Diffie-Hellman • A Diffie-Hellman key exchange is used to set up the Common Secret. This method has a higher resource consumption (both computation time and bandwidth) than the previous ones, but has the advantage of providing perfect forward secrecy. Also, it can be used without any PKI.

  8. MIKEY Cont.

  9. MIKEY Cont.

  10. Simulation Results • SRTP protocol uses AES algorithm, and DIffie-Hellman algorithm to securely exchange encryption keys.

  11. Simulation Results Cont. • SRTP at the beginning delay 63ms • RTP only delay 43 ms

  12. Conclusion • Accordingly to modeling results we see that in any case the delay of voice packets doesn’t exceed critical150 ms value. So, we can certainly propose, that we can ensure the quality of service for encrypting voice packets.

More Related