Enhancement of AES algorithm for IAX protocol
Voice over IP (VoIP) is transforming the telecommunication industry. It offers multiple opportunities such as lower call fees, convergence of voice and data networks, simplification of deployment, and greater integration with multiple applications that offer enhanced multimedia functionality. Howeve...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/12217/1/OmarAbdulMoutiMFSKSM2009.pdf http://eprints.utm.my/id/eprint/12217/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.12217 |
---|---|
record_format |
eprints |
spelling |
my.utm.122172018-06-25T03:20:18Z http://eprints.utm.my/id/eprint/12217/ Enhancement of AES algorithm for IAX protocol Abdul Mouti Molki, Omar QA75 Electronic computers. Computer science Voice over IP (VoIP) is transforming the telecommunication industry. It offers multiple opportunities such as lower call fees, convergence of voice and data networks, simplification of deployment, and greater integration with multiple applications that offer enhanced multimedia functionality. However, notwithstanding all these technological and economic opportunities, VoIP also brings up new challenges. Among them, security is perhaps the most compelling. Security for Voice over IP (VoIP) can be achieved in different ways. In this project new encryption algorithm has been proposed and implemented on IAX protocol with focusing on the performance for the secure media session. But VoIP has a very special characteristic: it is “time critical”. Time has a tremendous impact on this technology’s ability to performance, and to transmit meaningful information as well. Consequently, security considerations for VoIP must take additional steps to fulfill specific quality demands. First, the technology requires a very low latency less than 150ms. Second, packet loss cannot exceed the mark of 3%. Third, the technology is highly sensitive to “unquantifiable disrupting factors such as jitter”. All these factors converge and constitute the most critical of all VoIP security vulnerabilities to ensure the secure stream of VoIP service and provide satisfactory performance. 2009-04 Thesis NonPeerReviewed application/pdf en http://eprints.utm.my/id/eprint/12217/1/OmarAbdulMoutiMFSKSM2009.pdf Abdul Mouti Molki, Omar (2009) Enhancement of AES algorithm for IAX protocol. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computer Science and Information Systems. |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Abdul Mouti Molki, Omar Enhancement of AES algorithm for IAX protocol |
description |
Voice over IP (VoIP) is transforming the telecommunication industry. It offers multiple opportunities such as lower call fees, convergence of voice and data networks, simplification of deployment, and greater integration with multiple applications that offer enhanced multimedia functionality. However, notwithstanding all these technological and economic opportunities, VoIP also brings up new challenges. Among them, security is perhaps the most compelling. Security for Voice over IP (VoIP) can be achieved in different ways. In this project new encryption algorithm has been proposed and implemented on IAX protocol with focusing on the performance for the secure media session. But VoIP has a very special characteristic: it is “time critical”. Time has a tremendous impact on this technology’s ability to performance, and to transmit meaningful information as well. Consequently, security considerations for VoIP must take additional steps to fulfill specific quality demands. First, the technology requires a very low latency less than 150ms. Second, packet loss cannot exceed the mark of 3%. Third, the technology is highly sensitive to “unquantifiable disrupting factors such as jitter”. All these factors converge and constitute the most critical of all VoIP security vulnerabilities to ensure the secure stream of VoIP service and provide satisfactory performance. |
format |
Thesis |
author |
Abdul Mouti Molki, Omar |
author_facet |
Abdul Mouti Molki, Omar |
author_sort |
Abdul Mouti Molki, Omar |
title |
Enhancement of AES algorithm for IAX protocol |
title_short |
Enhancement of AES algorithm for IAX protocol |
title_full |
Enhancement of AES algorithm for IAX protocol |
title_fullStr |
Enhancement of AES algorithm for IAX protocol |
title_full_unstemmed |
Enhancement of AES algorithm for IAX protocol |
title_sort |
enhancement of aes algorithm for iax protocol |
publishDate |
2009 |
url |
http://eprints.utm.my/id/eprint/12217/1/OmarAbdulMoutiMFSKSM2009.pdf http://eprints.utm.my/id/eprint/12217/ |
_version_ |
1643645891829039104 |
score |
13.211869 |