VoIP Security: A Performance and Cost-benefit Analysis

Levi Perigo, Rahil Gandotra, Dewang Gedia, Moiz Hussain, Praniti Gupta, Shirin Bano, Vineet Kulkarni


Voice over IP (VoIP) has become the standard technology for telephony and has replaced the old Public Switched Telephone Network (PSTN). This research focuses on the security aspect of VoIP systems. Unsecured VoIP systems are vulnerable to malicious attacks. However, the overhead of the security techniques hampers the performance of VoIP systems. This research analyzes how a VoIP system performs with different security techniques. The performance of the VoIP system is analyzed on different types of data networks such as IPv4, IPv6, and IPv4/IPv6 mixed networks, and in scenarios such as with and without network traffic. Additionally, the research includes a cost-benefit analysis of the security techniques, to determine their cost effectiveness. Based on the performance analysis and cost-benefit analysis, this research proposes three security techniques that can be applied to VoIP systems deployed on IPv4, IPv6, and IPv4/IPv6 networks.


IPv4/IPv6, VoIP, security, performance, cost-benefit analysis.


Sudip S. (2015, Jul 05). "VoIP Services Market to Expand at 9.7% CAGR till 2020 Thanks to Increasing Adoption in Residential and Corporate Sectors" [Online]. Available: http://www.transparencymarketresearch.com/pressrelease/voip-services-market.htm

M. Desantis. "Understanding voice over Internet protocol (VoIP)", in US-Cert, 2006. Online: https://www.us-cert.gov/sites/default/files/publications/understanding_voip.pdf

A. B. Johnston, “SIP and the Internet,” in SIP: Understanding the Session Initiation Protocol, 3rd ed. Boston: Artech House, 2009, ch. 1, pp. 1-23.

J. Pollard. (2014, May 8). "VoIP Continues To Replace PSTN" [Online]. Available: http://blog.birch.com/voip-continues-to-replace-pstn

Butcher, D.; Xiangyang Li; Jinhua Guo, "Security Challenge and Defense in VoIP Infrastructures," in Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol.37, no.6, pp.1152-1162, Nov. 2007 doi: 10.1109/TSMCC.2007.905853.

J. Xin, "Security issues and countermeasure for VoIP". Online: https://www.sans.org/reading-room/whitepapers/voip/security-issues- countermeasure-voip-1701.

Sonwane, G.D.; Chandavarkar, B.R., "Security Analysis of Session Initiation Protocol in IPv4 and IPv6 Based VoIP Network," in Advanced Computing, Networking and Security (ADCONS), 2013 2nd International Conference on, vol., no., pp.187-192, 15-17 Dec. 2013. doi: 10.1109/ADCONS.2013.30.

Coulibaly, E.; Lian Hao Liu, "Security of Voip networks," in Computer Engineering and Technology (ICCET), 2010 2nd International Conference on, vol.3, no., pp. V3-104-V3-108, 16-18 April 2010. doi: 10.1109/ICCET.2010.5485790.

Perez-Botero, D.; Donoso, Y., "VoIP Eavesdropping: A Comprehensive Evaluation of Cryptographic Countermeasures," in Networking and Distributed Computing (ICNDC), 2011 Second International Conference on, vol., no., pp.192-196, 21-24 Sept. 2011. doi:10.1109/ICNDC.2011.46.

L. Shan; N. Jiang, "Research on Security Mechanisms of SIP-Based VoIP System," in Hybrid Intelligent Systems, 2009. HIS '09. Ninth International Conference on, vol.2, no., pp.408-410, 12-14 Aug. 2009 doi: 10.1109/HIS.2009.196.

R. Barbieri et al., “Voice over IPsec: Analysis and Solutions,” in ACSAC, 2002.

H. A. S. Ahmed, N. Sulaiman, and M.N. Mohammed, “Performance Analysis of VoIP Quality of Service in IPv4 and IPv6 environment,” in International Journal of Digital Content Technology and its Applications, vol. 8, no. 2, pp. 40–51, Apr. 2014.

T. G. Rahangdale, P. A. Tijare, and S. N. Sawalkar, “An Overview on Security Analysis of Session Initiation Protocol in VoIP network,” in International Journal of Research in Advent Technology, vol. 2, no. 4, pp. 190–195, Apr. 2014.

T. Hoeher, M. Petraschek, S. Tomic, and M. Hirschbichler, “Evaluating Performance Characteristics of SIP over IPv6,” in Journal of Networks, vol. 2, no.4, pp. 40–50, Aug. 2007.

R. Yasinovskyy, A. L. Wijesinha, and R. Karne, “VoIP performance with IPsec in IPv4-IPv6 transition networks,” 2010, vol. LXV, pp. 15–23.

C. Shen, et al., "The impact of TLS on SIP server performance", in IPTComm, 2010. Online: http://www.cs.columbia.edu/~hgs/papers/Shen1008_TLS.pdf.

M.T. Ashraf, J.N. Davies, V. Grout, "An Investigation into the Effect of Security on Performance in a VoIP Network", Online: http://www.glyndwr.ac.uk/computing/rese arch/pubs/sein_adg.pdf.

M. Kulin, T. Kazaz, S. Mrdovic, "SIP Server Security with TLS: Relative Performance Evaluation". Online: http://www.academia.edu/2570286/SIP_server_security_with_TLS_Relative_performance_evaluation.

A. Alexander et al., "An Evaluation of Secure Real-time Transport Protocol (SRTP) Performance for VoIP", in International Conference on Network and System Security, QLD, 2009, pp. 95-101.

(Jan 2014). Testing Voice over IP (VoIP) Networks (Rev B) Online: Available: https://www.ixiacom.com/sites/default/files/resources/whitepaper/voip-whitepaper.pdf.

A. Critelli. (2014, Jun 22). Hacking VoIP – Decrypting SDES Protected SRTP Phone Calls. [Online]. Available: https://www.acritelli.com/hacking-voip-decrypting-sdes-protected-srtp-phone-calls/.

D. Gedia and L. Perigo, “A centralized network management applicationfor academia and small business networks,” IT in Industry, vol. 6, no. 3, pp. 1-10, Aug. 2018.

Full Text: PDF


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

IT in Innovation IT in Business IT in Engineering IT in Health IT in Science IT in Design IT in Fashion

IT in Industry @ http://www.it-in-industry.com . ISSN (Online): 2203-1731; ISSN (Print): 2204-0595