Abstract
With the advent of ubiquitous access to multimedia content via wireless networks, users are more likely to have their data traverse a heterogeneous internetwork. Given the open nature of the Internet and wireless links, more users will demand end-to-end confidentiality. However, because of inherent error-expansion properties of secret-key encryption, it is a challenge to provide good subjective quality and end-to-end confidentiality for multimedia data, particularly in network environments subject to both loss and corruption impairments. This paper analyzes the affect end-to-end confidentiality has on the quality of service (QoS) in Voice over IP (VoIP) networks. To satisfy a given QoS objective, we show that mitigating the error-expansion caused by confidentiality comes at a cost. We measure this cost by increased delay, reduced bandwidth, and reduced traffic capacity. Thus, for this class of applications, we motivate the need for error-robust encryption and introduce one such technique in this paper.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
A. Webster and S. E. Tavares, On the design of S-boxes, in H. C. Williams (Ed.): Advances in Cryptology-Proc. of CRYPTO’ 85, Springer-Verlag, NY, pp. 523–534, 1986.
National Institute for Standards and Technology, Data Encryption Standard (DES), FIPS PUB 46-2, US Department of Commerce, Dec. 30, 1993.
X. Lai, On the design and security of block ciphers, ETH Series in Info. Proc., vol. 1, Konstanz: Hartung-Gorre Verlag, 1992.
National Institute for Standards and Technology, DES Modes of Operation, FIPS PUB 46-2, US Department of Commerce, Dec. 2, 1980.
J. Reason, End-to-end Confidentiality for Continuous-media Applications in Wireless Systems, Dissertation, UC Berkeley, December 2000.
S. Casner, R. Frederick, and V. Jacobson, RTP: A Transport Protocol for Real-Time Applications, IETF, RFC 1889, January, 1996.
C. Bormann et al, RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed, IETF, http://draft-ietf-rohc-rtp-09, Feb. 2001.
Bo Li; Hamdi, M.; Dongyi Iang; Xi-Ren Cao; Hou, Y.T., QoS enabled voice support in the next generation Internet: issues, existing approaches and challenges, IEEE Communications Magazine, Volume: 38 Issue: 4, April 2000
The Bluetooth Special Interest Group, Bluetooth Specification, http://www.bluetooth.com, Dec. 1999.
Recommendation GSM 06.10, GSM Full Rate Speech Transcoding, ETSI, Feb. 1992.
B. Skylar, Rayleigh fading channels in mobile digital communication systems part ii: mitigation, IEEE Communications Magazine, pp. 102–109, July 1997.
L. Yun and D.G. Messerschmitt, Power control and coding for variable QOS on a CDMA channel, Proc. IEEE MILCOM Conf., Fort Monmouth, NJ, Oct 2-4, 1994.
R. L. Pickholtz, et. al., Spread spectrum for mobile communications, IEEE Transactions on Vehicular Technology, Vol. 40, NO. 2, pp. 313–321, May, 1991.
M. B. Pursley, Performance evaluation for phase-coded spread-spectrum multipleaccess communication-part I: system analysis, IEEE Trans. on Comm., Vol.COM-25, NO. 8, pp. 795–799, August 1977.
P. J. Lee, Computation of the bit error rate of coherent M-ary PSK with Gray Code bit mapping, IEEE Trans. on Comm., Vol. COM-34, NO. 5, pp. 488–491, May, 1986.
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, The Twofish Encryption Algorithm, John Wiley & Sons, 1999.
J. Kelsey, B. Schneier, and N. Ferguson, Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator, Sixth Annual Workshop on Selected Areas in Cryptography, Springer Verlag, August 1999.
ANSI X9.17 (Revised), American national standard for financial institution Key management (wholesale), American Bankers Association, 1985.
P. Gutmann, Software generation of random numbers for cryptographic purposes, Proceedings of the 1998 Usenix Security Symposium, 1998.
National Institute for Standards and Technology, Key Management Using X9.17, FIPS PUB 171, US Department of Commerce, 1992.
P. Zimmermann, The Official PGP User’s Guide, MIT Press, 1995.
J. Walker and B. C. Wiles, Speak Freely, http://www.speakfreely.org, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this paper
Cite this paper
Reason, J.M., Messerschmitt, D.G. (2001). The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks. In: Al-Shaer, E.S., Pacifici, G. (eds) Management of Multimedia on the Internet. MMNS 2001. Lecture Notes in Computer Science, vol 2216. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45508-6_13
Download citation
DOI: https://doi.org/10.1007/3-540-45508-6_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42786-5
Online ISBN: 978-3-540-45508-0
eBook Packages: Springer Book Archive