際際滷

際際滷Share a Scribd company logo
Performance Analysis of VoIP Client with
Integrated Encryption Module
by
Rizal "Broer", Abdi Wahab, Mudrik Alaydrus,
Muhaemin
rizalbroer@ieee.org
1
Introduction
Background
Research
Purpose
Research
Question
Literature Review
Research
Methodology
Integrate
Sipdroid
with
Encryption
Module
Modified
Sipdroid
activity
diagram
Testing
Scenario
Result and
Discussion
Packet Loss
Delay
Throughput
Conclusion and
Recommendation
2
BackGround
Source: http://publikasi.kominfo.go.id (2011)
Teleconference
& VoIP
Send and
receiving Email
3
4
BackGround
 Internet users are increasing in Indonesia
based on the results of a survey of
Communication and Information Technology
in 2011 has increased very rapidly once.
 The largest percentage of 97.69% used the
Internet to send and receive email, while
the lowest is the promotion of the hotel
followed by VoIP with each percentage of
0.14% and 13.54%
5
Research Purpose
Purpose of this research is
 to integrate security features or modules or
data encryption using multiple encryption
methods such as AES, DES or RC4 on
Sipdroid VoIP client when communicate
through VoIP.
 to measure the performance of the VoIP
client that has integrated security or
encryption modules.
6
Research Question (RQ)
The formulation of problem can be determined
in this study are as follows:
 How to integrate a VoIP client running on
smarthphone or mobile-based encryption
module? (RQ1)
 How to measure the performance of mobile-
based VoIP client that has been integrated
with the encryption module? (RQ2)
7
LITERATURE REVIEW
Penulis = Author
8
Research Methodology
The correlation between the methods,
devices, parameters and results
No Methods /
Techniques
devices Parameter result
1. Making
encryption scheme
AES, DES, RC4
JCE Lock, Data Encryption Module
with AES, DES,
RC4.
2. Sipdroid
Integration with
Encryption
Module
Encryption
Module, Source
Sipdroid
Sipdroid integrated
with encryption
features.
3. Making Network
Test Bed
Smartphone
Android, VoIP
Server with
Asterisk
Test bed VoIP
network
4. Testing Sipdroid
with encryption
features using
Security Service.
Test bed VoIP
network, Android
Smartphone,
Wireshark
Data
confidentiality,
data integrity,
availability
Testing Data
Security Service.
5. Performance
measurement
Sipdroid with
encryption
features.
Wireshark, Test
bed VoIP network,
Android
Smartphone, the
survey.
Delay, packet
loss, throughput,
MOS.
Performance
measurement data
Sipdroid
9
10
Integrate Sipdroid with Encryption
Module
11
Modified Sipdroid activity diagram
12
Design of VoIP Test Bed
13
Testing Scenario
 Quality of Services ( QoS )
 Packet loss
 Delay
 Throughput
14
QoS Testing Result
 Packet Loss
15
QoS Testing Result
 Delay
16
QoS Testing Result
 Throughput
17
Conclusion ..(1)
 The encryption module generated from JCE
encryption can be integrated well with
Sipdroid by encrypting the RTP payload to
be transmitted on a VoIP network.
 Measurement performance of security
service for Sipdroid integrated with
encryption module can be done well. It
indicates that the integrated encryption
module work well.
18
Conclusion ..(2)
 QoS result from this measurement produce
enlarged delay more than 0.01 ms for
Sipdroid integrated with encryption module,
mean while for packet loss and throughput
there are no significance changes.
 Sipdroid with encryption module can
overcome passive attack, because captured
communication data by Wireshark can not
be decoded well, this happen due to the
encryption process in data.
19
Recommendations
 Fixing the sound quality from Sipdroid
integrated with encryption module.
 Adding a module to know encryption
scheme in the beginning of VoIP
communications.
 Analyze the payload data from encrypted
RTP.
 Simulate an attack on Sipdroid integrated
with encryption module.
20
Thank You
Rizalbroer@ieee.org
www.rizalbroer.info
www.facebook.com/rizal.broer
https://twitter.com/rizalbroer

More Related Content

What's hot (20)

IronPort
IronPortIronPort
IronPort
Netwax Lab
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config GuideCisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Alberto Rivai
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
International Journal of Science and Research (IJSR)
ioT-SecurityECC-v1
ioT-SecurityECC-v1ioT-SecurityECC-v1
ioT-SecurityECC-v1
Abe Arredondo
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
Jyoshna Cec Cse Staf bejjam
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Canada
IoT-SecurityECC-v4
IoT-SecurityECC-v4IoT-SecurityECC-v4
IoT-SecurityECC-v4
Abe Arredondo
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
martinvoelk
Isolation protocol
Isolation protocolIsolation protocol
Isolation protocol
Sajan Sahu
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
ijsrd.com
螻給 伎 覲伎朱 覦 伎 蠍一 蠏碁Μ螻 豈 覦- ろ語 觜 谿碁 蠍一 蟆 襷ル曙朱-
 螻給 伎 覲伎朱 覦 伎 蠍一 蠏碁Μ螻 豈 覦- ろ語 觜  谿碁 蠍一 蟆 襷ル曙朱- 螻給 伎 覲伎朱 覦 伎 蠍一 蠏碁Μ螻 豈 覦- ろ語 觜  谿碁 蠍一 蟆 襷ル曙朱-
螻給 伎 覲伎朱 覦 伎 蠍一 蠏碁Μ螻 豈 覦- ろ語 觜 谿碁 蠍一 蟆 襷ル曙朱-
JM code group
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
Editor IJMTER
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
Alberto Rivai
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
Zscaler
Presentation cisco iron port web usage controls
Presentation   cisco iron port web usage controlsPresentation   cisco iron port web usage controls
Presentation cisco iron port web usage controls
xKinAnx
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
FIWARE-IoT-Broker-introduction
FIWARE-IoT-Broker-introductionFIWARE-IoT-Broker-introduction
FIWARE-IoT-Broker-introduction
gesslers
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Dr. Amarjeet Singh
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
Ashok Panwar
Remotely Scanning Organizations Internal Network
Remotely Scanning Organizations Internal NetworkRemotely Scanning Organizations Internal Network
Remotely Scanning Organizations Internal Network
ijtsrd
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config GuideCisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Alberto Rivai
ioT-SecurityECC-v1
ioT-SecurityECC-v1ioT-SecurityECC-v1
ioT-SecurityECC-v1
Abe Arredondo
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Canada
IoT-SecurityECC-v4
IoT-SecurityECC-v4IoT-SecurityECC-v4
IoT-SecurityECC-v4
Abe Arredondo
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
martinvoelk
Isolation protocol
Isolation protocolIsolation protocol
Isolation protocol
Sajan Sahu
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
ijsrd.com
螻給 伎 覲伎朱 覦 伎 蠍一 蠏碁Μ螻 豈 覦- ろ語 觜 谿碁 蠍一 蟆 襷ル曙朱-
 螻給 伎 覲伎朱 覦 伎 蠍一 蠏碁Μ螻 豈 覦- ろ語 觜  谿碁 蠍一 蟆 襷ル曙朱- 螻給 伎 覲伎朱 覦 伎 蠍一 蠏碁Μ螻 豈 覦- ろ語 觜  谿碁 蠍一 蟆 襷ル曙朱-
螻給 伎 覲伎朱 覦 伎 蠍一 蠏碁Μ螻 豈 覦- ろ語 觜 谿碁 蠍一 蟆 襷ル曙朱-
JM code group
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
Editor IJMTER
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
Alberto Rivai
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
Zscaler
Presentation cisco iron port web usage controls
Presentation   cisco iron port web usage controlsPresentation   cisco iron port web usage controls
Presentation cisco iron port web usage controls
xKinAnx
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
FIWARE-IoT-Broker-introduction
FIWARE-IoT-Broker-introductionFIWARE-IoT-Broker-introduction
FIWARE-IoT-Broker-introduction
gesslers
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Dr. Amarjeet Singh
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
Ashok Panwar
Remotely Scanning Organizations Internal Network
Remotely Scanning Organizations Internal NetworkRemotely Scanning Organizations Internal Network
Remotely Scanning Organizations Internal Network
ijtsrd

Viewers also liked (6)

206 avra
206 avra206 avra
206 avra
4th International Conference on Advances in Energy Research (ICAER) 2013
eGovernment, free licenses & FoI in Germany
eGovernment, free licenses & FoI in GermanyeGovernment, free licenses & FoI in Germany
eGovernment, free licenses & FoI in Germany
clhanken
Forum Weserterrassen: Soziale MedienForum Weserterrassen: Soziale Medien
Forum Weserterrassen: Soziale Medien
clhanken
jBPM5 - The Evolution of BPM Systems
jBPM5 - The Evolution of BPM SystemsjBPM5 - The Evolution of BPM Systems
jBPM5 - The Evolution of BPM Systems
JBUG London
Socialbar Datenschutz Social MediaSocialbar Datenschutz Social Media
Socialbar Datenschutz Social Media
clhanken
BPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise ArchitectureBPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise Architecture
Nathaniel Palmer
eGovernment, free licenses & FoI in Germany
eGovernment, free licenses & FoI in GermanyeGovernment, free licenses & FoI in Germany
eGovernment, free licenses & FoI in Germany
clhanken
Forum Weserterrassen: Soziale MedienForum Weserterrassen: Soziale Medien
Forum Weserterrassen: Soziale Medien
clhanken
jBPM5 - The Evolution of BPM Systems
jBPM5 - The Evolution of BPM SystemsjBPM5 - The Evolution of BPM Systems
jBPM5 - The Evolution of BPM Systems
JBUG London
Socialbar Datenschutz Social MediaSocialbar Datenschutz Social Media
Socialbar Datenschutz Social Media
clhanken
BPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise ArchitectureBPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise Architecture
Nathaniel Palmer

Similar to Performance analysis vo_ip_client_integrated_encryption_module11a (20)

Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10
Rizal Broer
IPv6 Implementation challenges
IPv6 Implementation challengesIPv6 Implementation challenges
IPv6 Implementation challenges
Farwa Ansari
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
1crore projects
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
sierradeveloper
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
Kim Holm
MTI Workshop january 2024 for aws drs project
MTI Workshop january 2024 for aws drs projectMTI Workshop january 2024 for aws drs project
MTI Workshop january 2024 for aws drs project
lewiimmanuel
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
PositiveTechnologies
Pro Viva Emmanuel
Pro Viva EmmanuelPro Viva Emmanuel
Pro Viva Emmanuel
Emmanuel Emegha
Sagar_Ware_Resume
Sagar_Ware_ResumeSagar_Ware_Resume
Sagar_Ware_Resume
Sagar Ware
s2c-success-story-sirius.pdf
s2c-success-story-sirius.pdfs2c-success-story-sirius.pdf
s2c-success-story-sirius.pdf
S2C Limited
QoS of VOIP Over Broadband Network
QoS of VOIP Over Broadband NetworkQoS of VOIP Over Broadband Network
QoS of VOIP Over Broadband Network
Dr. Amarjeet Singh
R43019698
R43019698R43019698
R43019698
IJERA Editor
The Current And Future State Of Service Mesh
The Current And Future State Of Service MeshThe Current And Future State Of Service Mesh
The Current And Future State Of Service Mesh
Ram Vennam
Research - Mobility Solution Testing
Research - Mobility Solution TestingResearch - Mobility Solution Testing
Research - Mobility Solution Testing
mobiangle
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product Family
Cagdas Tanriover
Seguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloudSeguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloud
Nextel S.A.
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE
VOIP
VOIPVOIP
VOIP
Augusto Seixas
Voip Eddie Jan2010
Voip Eddie Jan2010Voip Eddie Jan2010
Voip Eddie Jan2010
ekaypour
Verso IoT experience What have we learned from implementations all over the...
Verso IoT experience  What have we learned from implementations all over the...Verso IoT experience  What have we learned from implementations all over the...
Verso IoT experience What have we learned from implementations all over the...
Bosnia Agile
Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10
Rizal Broer
IPv6 Implementation challenges
IPv6 Implementation challengesIPv6 Implementation challenges
IPv6 Implementation challenges
Farwa Ansari
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
1crore projects
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
sierradeveloper
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
Kim Holm
MTI Workshop january 2024 for aws drs project
MTI Workshop january 2024 for aws drs projectMTI Workshop january 2024 for aws drs project
MTI Workshop january 2024 for aws drs project
lewiimmanuel
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
PositiveTechnologies
Sagar_Ware_Resume
Sagar_Ware_ResumeSagar_Ware_Resume
Sagar_Ware_Resume
Sagar Ware
s2c-success-story-sirius.pdf
s2c-success-story-sirius.pdfs2c-success-story-sirius.pdf
s2c-success-story-sirius.pdf
S2C Limited
QoS of VOIP Over Broadband Network
QoS of VOIP Over Broadband NetworkQoS of VOIP Over Broadband Network
QoS of VOIP Over Broadband Network
Dr. Amarjeet Singh
The Current And Future State Of Service Mesh
The Current And Future State Of Service MeshThe Current And Future State Of Service Mesh
The Current And Future State Of Service Mesh
Ram Vennam
Research - Mobility Solution Testing
Research - Mobility Solution TestingResearch - Mobility Solution Testing
Research - Mobility Solution Testing
mobiangle
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product Family
Cagdas Tanriover
Seguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloudSeguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloud
Nextel S.A.
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE
Voip Eddie Jan2010
Voip Eddie Jan2010Voip Eddie Jan2010
Voip Eddie Jan2010
ekaypour
Verso IoT experience What have we learned from implementations all over the...
Verso IoT experience  What have we learned from implementations all over the...Verso IoT experience  What have we learned from implementations all over the...
Verso IoT experience What have we learned from implementations all over the...
Bosnia Agile

Performance analysis vo_ip_client_integrated_encryption_module11a

Editor's Notes

  • #2: Assalamualaikum, Greting everone, Nice to meet you all. Let me introduce my self, my name is Rizal Broer and my email is: rizalbroer@ieee.org I want to presented my paper about: performance analysis of VOIP Client with Integrated Encryption Module. This paper result of collaboration with abdi wahab, mudrik, muhaemin 02/06/13
  • #3: Road map this prentation can be see in the picture. There will be 5 part, those are: Introduction Literature Review Research Methodology Result and Discussion Conclusion and Recommendation In introduction part there will be 3 subpart, those are: Background Research Purpose Research Question. And other subpart are show in the figure. 02/06/13
  • #4: Let me start with the first part Introduction, with sub part Background From the survey result of Ministry of Communication and Information , Indonesia. This survey is questioning about the use of Internet Indonesia. Around 97 % of internet user population use for sending and receiving email. (that is the majority of use of internet) Around 13 % of internet user population use for teleconference and voip. From that survey we see, a lot of room for improvement voip user. 02/06/13
  • #5: 02/06/13
  • #6: 02/06/13
  • #7: 02/06/13
  • #8: 02/06/13
  • #9: Research Methodology Have 6 step. 02/06/13
  • #10: 02/06/13
  • #11: 02/06/13
  • #12: 02/06/13
  • #13: 02/06/13
  • #14: 02/06/13
  • #15: 02/06/13
  • #16: 02/06/13
  • #17: 02/06/13
  • #18: 02/06/13
  • #19: 02/06/13
  • #20: 02/06/13
  • #21: 02/06/13