Performance Analysis of Point Multiplication Algorithms in ECDH for an End-to-End VoIP Network

被引:0
作者
Vennila, G. [1 ]
Manikandan, M. S. K. [1 ]
Aswathi, S. [1 ]
机构
[1] Thiagarajar Coll Engn, Dept Elect & Commun Engn, Madurai, Tamil Nadu, India
来源
2015 ANNUAL IEEE INDIA CONFERENCE (INDICON) | 2015年
关键词
VoIP; SIP; ECDH; Scalar Multiplication; ECC; SESSION SETUP DELAY;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Voice over Internet Protocol (VoIP) has accomplished enormous growth in recent years due to its low cost and flexible service enhancement. Session Initiation Protocol (SIP) is a communication protocol for signaling and managing the media streams (voice, video and audio) over IP based network. The well-known contribution in securing a VoIP voice packet is Advanced Encryption Standard (AES) with a secret key negotiation over Elliptic Curve Diffie Hellman (ECDH). In this paper, we evaluate the performance of scalar multiplication algorithms (binary, NAF, MoF) in order to estimate signaling response and call setup time over ECDH based VoIP protection. Finally, experimental results show that an appropriate selection of scalar multiplication algorithms helps to increase the trustworthiness between service provider and user in-terms of call setup delay.
引用
收藏
页数:6
相关论文
共 20 条
[1]   A Trustable Key Exchange Protocol for Mobile Oriented VoIP Devices via ECDH and Synchronous Key Update Mechanism [J].
Chandirasekaran, D. ;
Aghila, G. ;
Thiyagarajan, P. .
INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 :2263-2271
[2]  
El Mahdi Boumezzough Mohamed, 2013, Advanced Infocomm Technology. 5th IEEE International Conference, ICAIT 2012. Revised Papers: LNCS 7593, P16
[3]   On SIP session setup delay for VoIP services over correlated fading channels [J].
Fathi, H ;
Chakraborty, SS ;
Prasad, R .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (01) :286-295
[4]   Optimization of SIP session setup delay for VoIP in 3G wireless networks [J].
Fathi, Hanane ;
Chakraborty, Shyam S. ;
Prasad, Ramjee .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (09) :1121-1132
[5]   The model of end-to-end call setup time calculation for Session Initiation Protocol [J].
Gutkowski, P. S. ;
Kaczmarek, S. .
BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES, 2012, 60 (01) :95-101
[6]  
Haas C., 2012, Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, P133, DOI [10.1145/2387191, DOI 10.1145/2387191]
[7]   An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem [J].
Han, Weiwei ;
Zhu, Zhian .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (08) :1173-1185
[8]   Fast point multiplication on Koblitz curves: Parallelization method and implementations [J].
Jarvinen, Kimmo ;
Skytta, Jorma .
MICROPROCESSORS AND MICROSYSTEMS, 2009, 33 (02) :106-116
[9]  
Lederer C, 2009, LECT NOTES COMPUT SC, V5746, P112, DOI 10.1007/978-3-642-03944-7_9
[10]  
Liu Z., 2015, PROC ACM S INF COMPU, P145