An Efficient system for improved throughput and delay over VOIP

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-44 Number-1
Year of Publication : 2017
Authors : Omesh Kalambe, Bhagyashri Pokale, Ashwini Meshram
DOI :  10.14445/22312803/IJCTT-V44P109

MLA

Omesh Kalambe, Bhagyashri Pokale, Ashwini Meshram  "An Efficient system for improved throughput and delay over VOIP". International Journal of Computer Trends and Technology (IJCTT) V44(1):46-49, February 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Voice over Internet Protocol (VoIP) is a growing Communication and Information technology that assists voice communication through the Internet. VoIP is becoming popular due to their cost valuable service and convenience. A VoIP technique has two significant features i.e. Privacy and QoS of the network. Unfortunately, most VoIP network doesn’t offer Privacy as well as QoS to the user. A work has done before on Security and Quality of Services for VoIP applications, yet these issues has not been completely solved. To overcome these issues in VoIP proposed a novel Advanced Encryption Standard (AES) and Secure Hash Algorithm -1 (SHA-1) for Client-Server model. Here, AES and SHA-1 are use to afford secrecy.

References
[1] Zahraa Sabra and Hassan Artail, “Preserving Anonymity and Quality of Service for VoIP Applications over Hybrid Networks,” 17th IEEE Mediterranean Electro technical Conference, Beirut, Lebanon, 13-16, April 2014.
[2] K. Bharathkumar, R. Premalatha Kanikannan, Dr.Rajeswari Mukesh, M.Kasiselvi, T. Kumanan, “Privacy Preserving of VoIP against Peer-to-Peer Network Attacks and Defense,” International Journal of Computer Network and Security (IJCNS) Vol 4. No 1. Jan-Mar 2012 ISSN: 0975-8283.
[3] Mudhakar Srivatsa, Ling Liu and Arun Iyengar, “Preserving Caller Anonymity in Voice-over-IP Networks,” 978-0-7695-3168-7 /08 $25.00 © 2008 IEEE.
[4] Mudhakar Srivatsa, Arun Iyengar, Ling Liu and Hongbo Jiang, “Privacy in VoIP Networks:Flow Analysis Attacks and Defense,” IEEE INFOCOM 2009.
[5] Celia Li and Uyen Trang Nguyen, “Fast- Authentication for Mobile Clients in Wireless Mesh Networks,” 978-1-4244-5377-1/10/$26.00 ©2010 IEEE.
[6] Abdi Wahab, Rizal Broer Bahaweres, Mudrik Alaydrus, Muhaemin, Riyanarto Sarno, “Performance Analysis of VoIP Client with Integrated Encryption Module,” 978-1-4673-2821-0/13/$31.00 ©2013 IEEE.
[7] Pallavi Gangurde, Sanjay Waware, and Dr. Nisha Sarwade, “Simulation of TCP, UDP and SCTP with constant traffic for VOIP services,” Vol. 2, Issue 3, May-Jun 2012, pp.1245-1248.
[8] http://toncar.cz/Tutorials/VoIP/VoIP_Protocols_Introducing_H323.html.
[9] http://www.telecomspace.com/vop-h323.html.
[10] http://www.networkworld.com/article/2332980/lan-wan/what-is-sip-.html.
[11] http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-1/s.
[12] http://www.en.voipforo.com/SIP/SIP_architecture.php.
[13] Monjur Alam and Sonai Ray,”Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach”, International Journal of Network Security, Vol.15, No.6, PP.465-470, Nov. 2013,pp no 465-470
[14] Pallavi Gangurde, Sanjay Waware, and Dr. Nisha Sarwade, “Simulation of TCP, UDP and SCTP with constant traffic for VOIP services,” Vol. 2, Issue 3, May-Jun 2012, pp.1245-1248.
[15] https://en.wikipedia.org/wiki/SHA-1#SHA-0
[16] https://www.google.co.in/url?sa=i& rct=j& q=& esrc=s& source=images&cd=& cad=rja& uact=8& ved=0ahUKEwiKgbzx0bLSAhXLlJQKHVp3Bx4QjRwIBw& url=http%3A%2 %2Fopticalengineering.spiedigitallibrary.org%2Farticle.aspx%3Farticleid%3D1863832& psig=AFQjCNHeTY8VIkvBV1o9MF5f6LYTO6beGw& ust=1488366071531470

Keywords
QoS, VoIP, SHA-1, AES.