SlideShare una empresa de Scribd logo
1 de 20
Performance Analysis of VoIP Client with
Integrated Encryption Module
by
Rizal "Broer", Abdi Wahab, Mudrik Alaydrus,
Muhaemin
rizalbroer@ieee.org
1
Introduction
Background
Research
Purpose
Research
Question
Literature Review
Research
Methodology
Integrate
Sipdroid
with
Encryption
Module
Modified
Sipdroid
activity
diagram
Testing
Scenario
Result and
Discussion
Packet Loss
Delay
Throughput
Conclusion and
Recommendation
2
BackGround
Source: http://publikasi.kominfo.go.id (2011)
Teleconference
& VoIP
Send and
receiving Email
3
4
BackGround
 Internet users are increasing in Indonesia
based on the results of a survey of
Communication and Information Technology
in 2011 has increased very rapidly once.
 The largest percentage of 97.69% used the
Internet to send and receive email, while
the lowest is the promotion of the hotel
followed by VoIP with each percentage of
0.14% and 13.54%
5
Research Purpose
Purpose of this research is
 to integrate security features or modules or
data encryption using multiple encryption
methods such as AES, DES or RC4 on
Sipdroid VoIP client when communicate
through VoIP.
 to measure the performance of the VoIP
client that has integrated security or
encryption modules.
6
Research Question (RQ)
The formulation of problem can be determined
in this study are as follows:
• How to integrate a VoIP client running on
smarthphone or mobile-based encryption
module? (RQ1)
• How to measure the performance of mobile-
based VoIP client that has been integrated
with the encryption module? (RQ2)
7
LITERATURE REVIEW
Penulis = Author
8
Research Methodology
The correlation between the methods,
devices, parameters and results
No Methods /
Techniques
devices Parameter result
1. Making
encryption scheme
AES, DES, RC4
JCE Lock, Data Encryption Module
with AES, DES,
RC4.
2. Sipdroid
Integration with
Encryption
Module
Encryption
Module, Source
Sipdroid
Sipdroid integrated
with encryption
features.
3. Making Network
Test Bed
Smartphone
Android, VoIP
Server with
Asterisk
Test bed VoIP
network
4. Testing Sipdroid
with encryption
features using
Security Service.
Test bed VoIP
network, Android
Smartphone,
Wireshark
Data
confidentiality,
data integrity,
availability
Testing Data
Security Service.
5. Performance
measurement
Sipdroid with
encryption
features.
Wireshark, Test
bed VoIP network,
Android
Smartphone, the
survey.
Delay, packet
loss, throughput,
MOS.
Performance
measurement data
Sipdroid
9
10
Integrate Sipdroid with Encryption
Module
11
Modified Sipdroid activity diagram
12
Design of VoIP Test Bed
13
Testing Scenario
 Quality of Services ( QoS )
 Packet loss
 Delay
 Throughput
14
QoS Testing Result
 Packet Loss
15
QoS Testing Result
 Delay
16
QoS Testing Result
 Throughput
17
Conclusion ……..(1)
• The encryption module generated from JCE
encryption can be integrated well with
Sipdroid by encrypting the RTP payload to
be transmitted on a VoIP network.
• Measurement performance of security
service for Sipdroid integrated with
encryption module can be done well. It
indicates that the integrated encryption
module work well.
18
Conclusion ……..(2)
• QoS result from this measurement produce
enlarged delay more than 0.01 ms for
Sipdroid integrated with encryption module,
mean while for packet loss and throughput
there are no significance changes.
• Sipdroid with encryption module can
overcome passive attack, because captured
communication data by Wireshark can not
be decoded well, this happen due to the
encryption process in data.
19
Recommendations
• Fixing the sound quality from Sipdroid
integrated with encryption module.
• Adding a module to know encryption
scheme in the beginning of VoIP
communications.
• Analyze the payload data from encrypted
RTP.
• Simulate an attack on Sipdroid integrated
with encryption module.
20
Thank You
Rizalbroer@ieee.org
www.rizalbroer.info
www.facebook.com/rizal.broer
https://twitter.com/rizalbroer

Más contenido relacionado

La actualidad más candente

Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config GuideCisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config GuideAlberto Rivai
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a HackerCisco Canada
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51martinvoelk
 
Isolation protocol
Isolation protocolIsolation protocol
Isolation protocolSajan Sahu
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedureijsrd.com
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-JM code group
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-idAlberto Rivai
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly servicesZscaler
 
Presentation cisco iron port web usage controls
Presentation   cisco iron port web usage controlsPresentation   cisco iron port web usage controls
Presentation cisco iron port web usage controlsxKinAnx
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET Journal
 
FIWARE-IoT-Broker-introduction
FIWARE-IoT-Broker-introductionFIWARE-IoT-Broker-introduction
FIWARE-IoT-Broker-introductiongesslers
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Dr. Amarjeet Singh
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarAshok Panwar
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Networkijtsrd
 

La actualidad más candente (20)

IronPort
IronPortIronPort
IronPort
 
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config GuideCisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
ioT-SecurityECC-v1
ioT-SecurityECC-v1ioT-SecurityECC-v1
ioT-SecurityECC-v1
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
 
IoT-SecurityECC-v4
IoT-SecurityECC-v4IoT-SecurityECC-v4
IoT-SecurityECC-v4
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Isolation protocol
Isolation protocolIsolation protocol
Isolation protocol
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
Presentation cisco iron port web usage controls
Presentation   cisco iron port web usage controlsPresentation   cisco iron port web usage controls
Presentation cisco iron port web usage controls
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
FIWARE-IoT-Broker-introduction
FIWARE-IoT-Broker-introductionFIWARE-IoT-Broker-introduction
FIWARE-IoT-Broker-introduction
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Network
 

Destacado

Destacado (6)

206 avra
206 avra206 avra
206 avra
 
eGovernment, free licenses & FoI in Germany
eGovernment, free licenses & FoI in GermanyeGovernment, free licenses & FoI in Germany
eGovernment, free licenses & FoI in Germany
 
Forum Weserterrassen: Soziale Medien
Forum Weserterrassen: Soziale MedienForum Weserterrassen: Soziale Medien
Forum Weserterrassen: Soziale Medien
 
jBPM5 - The Evolution of BPM Systems
jBPM5 - The Evolution of BPM SystemsjBPM5 - The Evolution of BPM Systems
jBPM5 - The Evolution of BPM Systems
 
Socialbar Datenschutz Social Media
Socialbar Datenschutz Social MediaSocialbar Datenschutz Social Media
Socialbar Datenschutz Social Media
 
BPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise ArchitectureBPM & Workflow in the New Enterprise Architecture
BPM & Workflow in the New Enterprise Architecture
 

Similar a Performance analysis vo_ip_client_integrated_encryption_module11a

Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10Rizal Broer
 
IPv6 Implementation challenges
IPv6 Implementation challengesIPv6 Implementation challenges
IPv6 Implementation challengesFarwa Ansari
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage1crore projects
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelesssierradeveloper
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) USKim Holm
 
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!PositiveTechnologies
 
Sagar_Ware_Resume
Sagar_Ware_ResumeSagar_Ware_Resume
Sagar_Ware_ResumeSagar Ware
 
s2c-success-story-sirius.pdf
s2c-success-story-sirius.pdfs2c-success-story-sirius.pdf
s2c-success-story-sirius.pdfS2C Limited
 
QoS of VOIP Over Broadband Network
QoS of VOIP Over Broadband NetworkQoS of VOIP Over Broadband Network
QoS of VOIP Over Broadband NetworkDr. Amarjeet Singh
 
The Current And Future State Of Service Mesh
The Current And Future State Of Service MeshThe Current And Future State Of Service Mesh
The Current And Future State Of Service MeshRam Vennam
 
Research - Mobility Solution Testing
Research - Mobility Solution TestingResearch - Mobility Solution Testing
Research - Mobility Solution Testingmobiangle
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyCagdas Tanriover
 
Seguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloudSeguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloudNextel S.A.
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE
 
Voip Eddie Jan2010
Voip Eddie Jan2010Voip Eddie Jan2010
Voip Eddie Jan2010ekaypour
 
Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Bosnia Agile
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UCRachid ZINE
 

Similar a Performance analysis vo_ip_client_integrated_encryption_module11a (20)

Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10Performance analysis vo_ip_client_integrated_encryption_module10
Performance analysis vo_ip_client_integrated_encryption_module10
 
IPv6 Implementation challenges
IPv6 Implementation challengesIPv6 Implementation challenges
IPv6 Implementation challenges
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
 
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
 
Pro Viva Emmanuel
Pro Viva EmmanuelPro Viva Emmanuel
Pro Viva Emmanuel
 
Sagar_Ware_Resume
Sagar_Ware_ResumeSagar_Ware_Resume
Sagar_Ware_Resume
 
s2c-success-story-sirius.pdf
s2c-success-story-sirius.pdfs2c-success-story-sirius.pdf
s2c-success-story-sirius.pdf
 
QoS of VOIP Over Broadband Network
QoS of VOIP Over Broadband NetworkQoS of VOIP Over Broadband Network
QoS of VOIP Over Broadband Network
 
R43019698
R43019698R43019698
R43019698
 
The Current And Future State Of Service Mesh
The Current And Future State Of Service MeshThe Current And Future State Of Service Mesh
The Current And Future State Of Service Mesh
 
Research - Mobility Solution Testing
Research - Mobility Solution TestingResearch - Mobility Solution Testing
Research - Mobility Solution Testing
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product Family
 
Seguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloudSeguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloud
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
 
VOIP
VOIPVOIP
VOIP
 
Voip Eddie Jan2010
Voip Eddie Jan2010Voip Eddie Jan2010
Voip Eddie Jan2010
 
Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UC
 

Performance analysis vo_ip_client_integrated_encryption_module11a

Notas del editor

  1. Assalamualaikum, Greting everone, Nice to meet you all. Let me introduce my self, my name is Rizal “Broer” and my email is: rizalbroer@ieee.org I want to presented my paper about: performance analysis of VOIP Client with Integrated Encryption Module. This paper result of collaboration with abdi wahab, mudrik, muhaemin 02/06/13
  2. Road map this prentation can be see in the picture. There will be 5 part, those are: Introduction Literature Review Research Methodology Result and Discussion Conclusion and Recommendation In introduction part there will be 3 subpart, those are: Background Research Purpose Research Question…. And other subpart are show in the figure. 02/06/13
  3. Let me start with the first part Introduction, with sub part Background From the survey result of Ministry of Communication and Information , Indonesia. This survey is questioning about the use of Internet Indonesia. Around 97 % of internet user population use for sending and receiving email. (that is the majority of use of internet) Around 13 % of internet user population use for teleconference and voip. From that survey we see, a lot of room for improvement voip user. 02/06/13
  4. 02/06/13
  5. 02/06/13
  6. 02/06/13
  7. 02/06/13
  8. Research Methodology Have 6 step. 02/06/13
  9. 02/06/13
  10. 02/06/13
  11. 02/06/13
  12. 02/06/13
  13. 02/06/13
  14. 02/06/13
  15. 02/06/13
  16. 02/06/13
  17. 02/06/13
  18. 02/06/13
  19. 02/06/13
  20. 02/06/13