Impact of Encryption on Qos in Voip
|dc.contributor.editor||Stephen S Yau|
|dc.identifier.citation||Radmand, P. and Talevski, A. 2010. Impact of Encryption on Qos in Voip, in Yau, S.S. (ed), 2nd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), Aug 20 2010, pp. 721-726. Minnesota, USA: IEEE.|
This paper studies the impact of different encryption algorithms on the quality of Voice over Internet Protocol (VoIP). Assuring Quality of Service (QoS) is one of the primary issues in any IP based application that examines the voice quality of VoIP. This paper examines QoS in terms of lost packet ratio, latency and jitter using different encryption algorithms along with firewalling at the IP layer. The results of laboratory tests indicate that the impact on the overall performance of VoIP depends upon the bandwidth available and encryption used. Findings include the need for the provision of bandwidth for encryption, and even when adequate bandwidth is provided encryption algorithms can increase lost packet ratios and packet latency, and reduce.Overall, the results indicate the implementation of encryption algorithms may degrade the voice quality even if bandwidth is adequate.
|dc.publisher||IEEE Computer Society|
|dc.title||Impact of Encryption on Qos in Voip|
|dcterms.source.title||Proceedings of the 2nd IEEE international conference on information privacy, security, risk and trust (PASSAT 2010)|
|dcterms.source.series||Proceedings of the 2nd IEEE international conference on information privacy, security, risk and trust (PASSAT 2010)|
|dcterms.source.conference||2nd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010)|
|dcterms.source.conference-start-date||Aug 20 2010|
Copyright © 2010 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
|curtin.department||Digital Ecosystems and Business Intelligence Institute (DEBII)|