CFP last date
20 January 2025
Reseach Article

Architecture of Multipath VoIP using Modified Secret Sharing Algorithm

by K. Maheswari, Dr. M. Punithavalli
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 36 - Number 3
Year of Publication: 2011
Authors: K. Maheswari, Dr. M. Punithavalli
10.5120/4470-6264

K. Maheswari, Dr. M. Punithavalli . Architecture of Multipath VoIP using Modified Secret Sharing Algorithm. International Journal of Computer Applications. 36, 3 ( December 2011), 12-18. DOI=10.5120/4470-6264

@article{ 10.5120/4470-6264,
author = { K. Maheswari, Dr. M. Punithavalli },
title = { Architecture of Multipath VoIP using Modified Secret Sharing Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { December 2011 },
volume = { 36 },
number = { 3 },
month = { December },
year = { 2011 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume36/number3/4470-6264/ },
doi = { 10.5120/4470-6264 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:22:09.861529+05:30
%A K. Maheswari
%A Dr. M. Punithavalli
%T Architecture of Multipath VoIP using Modified Secret Sharing Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 36
%N 3
%P 12-18
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Voice over Internet Protocol is an integration of Computer and telephony. It is the replacement of present telephone technology. There are some difficulties that are faced by VoIP users such as packet loss, delay, security, echo, bandwidth overhead and throughput. The critical problem is providing security and reducing packet loss. In this paper, the architecture of multipath VoIP routing using modified Shamir’s secret sharing algorithm is implemented to provide more security with the reduced end-to-end delay. The algorithm is modified in the distribution phase of shares. The simulation results show that it achieves better performance. This work is implemented in NS-2.

References
  1. Dr.As’ad mahmoud As’ad alnaser, ”secure data transfer based on multipath routing, International journal of academic research, vol 3,No.3,may 2011.
  2. Aristotelis Tsirigos and Zygmunt J.Haas, ”Multipath routing in the presence of frequent topological changes”, IEEE communications magazine,Nov 2001.
  3. Berry Schoenmakers, ” A simple publicly verifiable secret sharing scheme and its application to electronic voting”, CRYPTO 99 vol 1666 of lecture notes in Computer science, springer-verlag, 1999, pp: 148-164, 1999.
  4. Binod Vaidya, Joel J.P.C.Rodrigues and Hyuk Lim, ”Secure multimedia streaming over multipath wireless Ad hoc network: Design and Implementation”.
  5. D.Butcher ,X.Li, and J.Guo, ”Security challenge and defence in VoIP infrastructures”, IEEE trans. Systems, man and cybernetics- part c:Applications and reviews , vol 37,no.6,pp. 1152-1162,nov 2007.
  6. E.Gustafsson, G.Karlsson,” A literature survey on traffic dispersion”, IEEE networks, Apr 1997.
  7. Hanoch, Levy, Haim, Zlatokrilov,” the effect of packet dispersion on voice applications in IP networks”, IEEE / ACM transactions on networking.
  8. Hong Li and LorneMason,”multipath routing with adaptive playback scheduling for voice over IP in service overlay networks”.
  9. Housam Al-Allouni, Alaa Eldin Rohiem, Mohammed Hashem Abd El-Azizahmed,Ali El-Moghazy, ”VoIP Denial of Service Attacks Classification and Implementation,26th national radio science conference, march 2009.
  10. Hugo Krawczyk,”secret sharing made short”, 1998, Springer-verlag.
  11. HKH09] Hui Tian , Ke Zhou, Hong Jiang, Jin Liu,Yongfeng Huang, Dan Feng, ”An M-sequence based steganography model for voice over IP”, publication in the IEEE ICC 2009 proceedings.
  12. D.B.Johnson,D.A.Maltz,Y.C.Hu,J.G.jetcheva, ”the dynamic source routing protocol for mobile ad hoc networks”, Nov 2001.
  13. JoongMan Kim, SeokUng Yoon, HyunCheol Jeong, YooJae Won,” Implementation and Evaluation of SIP-based Secure VoIP Communication System”, IEEE/IFIP International Conference on Embedded and Ubiquitous Computing,2008.
  14. Joongman kim, seokung yoon, yoojae won, jaeil lee, ”VoIP secure communication protocol satisfying backward compatibility”,second Intrntional conference on systems and networks communications,IEEE,2007.
  15. Kevork R. Piloyan, Vahé Nerguizian, “Novel Architecture for Routing Packetized Voice over Existing Internet Infrastructure without Using the Internet Protocol”, IJCSNS International Journal of Computer Science and Network Security, VOL.6.No.7B, July 2006.
  16. S.J.Lee and M.Gerla,” Split Multipath routing with maximally disjoint paths in ad hoc networks”, proc. of Int. Conf. on Communications, vol.10, pp.3201-3205, June 2001.
  17. Ryouichi Nishimura, Shun-ichiro Abe, Norihiro Fujita and Yoiti Suzuki,” Reinforcement of VoIP security with multipath routing and secret sharing scheme”, Jouranl of information hiding and multimedia signal processing, 2010,Vol 1,number 3, July 2010,ISSn: 2073-4212.
  18. A. Shamir, “How to Share a Secret”, Communications of the ACM, 22(11):612-613, November 1979.
Index Terms

Computer Science
Information Sciences

Keywords

Security Multipath VoIP Secret sharing Delay