Voice and Video Capacity of a Secure Wireless System

Abstract : Improving the security and availability of secure wireless multimedia systems is the purpose of this thesis. Specifically, this thesis answered research questions about the capacity of wireless multimedia systems and how three variables relate to this capacity. The effects of securing the voice signal, real-time traffic originating foreign to a wireless local area network and use of an audio-only signal compared with a combined signal were all studied. The research questions were answered through a comprehensive literature review in addition to an experiment which had thirty-six subjects using a secure wireless multimedia system which was developed as part of this thesis effort. Additionally, questions related to the techniques for deploying wireless multimedia system including the maturity and security of the technology were answered. The research identified weaknesses in existing analytical and computer models and the need for a concise and realistic model of wireless multimedia systems. The culmination of this effort was the integration of an audio-video system with an existing research platform which is actively collecting data for the Logistics Readiness Branch of the Air Force Research Laboratory.

[1]  Roberto Battiti,et al.  Performance Analysis of an Enhanced IEEE 802.11 Distributed Coordination Function Supporting Service Differentiation , 2003, QofIS.

[2]  Thomas Wiegand,et al.  Draft ITU-T recommendation and final draft international standard of joint video specification , 2003 .

[3]  Wang Xin-mei,et al.  Property of finite fields and its cryptography application , 2003 .

[4]  Nicola Brace,et al.  SPSS for psychologists: a guide to data analysis using SPSS for Windows (versions 9, 10 and 11). 2nd edition , 2007 .

[5]  Grenville Armitage,et al.  Quantitative Assessment of IP Service Quality in 802.11b and DOCSIS networks , 2004 .

[6]  Dan Wing,et al.  Session Description Protocol (SDP) Security Descriptions for Media Streams , 2006, RFC.

[7]  Martin J. Russell,et al.  Objective quality analysis of a Voice over Internet Protocol system , 2000 .

[8]  Thomas Porter,et al.  Practical VoIP Security , 2006 .

[9]  Sachin Garg,et al.  An experimental study of throughput for UDP and VoIP traffic in IEEE 802.11b networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[10]  Vincent Rijmen,et al.  Update on SHA-1 , 2005, CT-RSA.

[11]  Quan Yuan,et al.  A New Efficient ID-Based Authenticated Key Agreement Protocol , 2005, IACR Cryptol. ePrint Arch..

[12]  Norman H. Anderson,et al.  Empirical Direction in Design and Analysis , 2001 .

[13]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[14]  Yvo Desmedt,et al.  Man-in-the-Middle Attack , 2005, Encyclopedia of Cryptography and Security.

[15]  Brian A. Carter,et al.  Advanced Encryption Standard , 2007 .

[16]  Edjair de Souza Mota,et al.  An E-model implementation for speech quality evaluation in VoIP systems , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[17]  Fouad A. Tobagi,et al.  Capacity of an IEEE 802.11b wireless LAN supporting VoIP , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[18]  Ajay Luthra,et al.  The H.264/AVC Advanced Video Coding standard: overview and introduction to the fidelity range extensions , 2004, SPIE Optics + Photonics.

[19]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[20]  Gerardo Rubino Wireless VoIP at Home: Are We There Yet? , 2005 .

[21]  Manfred R. Schroeder,et al.  Code-excited linear prediction(CELP): High-quality speech at very low bit rates , 1985, ICASSP '85. IEEE International Conference on Acoustics, Speech, and Signal Processing.

[22]  Barry E. Mullins,et al.  Audio-video capacity of an IEEE 802.11g wireless LAN , 2007, 2007 International Symposium on Collaborative Technologies and Systems.

[23]  Alan Clark,et al.  Modeling the effects of burst packet loss and recency on subjective voice quality , 2001 .

[24]  Jari Arkko,et al.  MIKEY: Multimedia Internet KEYing , 2004, RFC.

[25]  Tiphon Release 3; Technology Compliance Specification; Part 5: Quality of Service (qos) Measurement Methodologies Copyright Notification Annex E (informative): Method for Determining an Equipment Impairment Factor Using Intellectual Property Rights Figure 1: Tiphon Wg5 Qos Documentation Structure , .

[26]  Alexandre Proutière,et al.  Evaluating the voice capacity of 802.11 WLAN under distributed control , 2005, 2005 14th IEEE Workshop on Local & Metropolitan Area Networks.