Uvoip: Cross-layer Optimization of Buffer Operations for Providing Secure Voip Services on Constrained Embedded Devices

نویسندگان

  • Thothadri Rajesh
  • Amrita Vishwa Vidyapeetham
چکیده

In this paper, we present an optimized implementation of secure VoIP protocol stack so that the stack would fit into the memory and computation budget of constrained embedded systems. The novel approach that we take to achieve this is to perform cross-layer optimization of buffers and buffer operations. Buffers and buffer operations are involved in playback, capture, codec transformations, and network I/O. Following this approach, we have implemented VoIP application functions, RTP, and Secure RTP protocols in a tightly integrated and highly optimized manner, on the top of the embedded TCP/IP stack, uIP. We call the protocol stack thus constructed, the uVoIP stack. We have tested the uVoIP stack in GNU/Linux Operating System using tunnel device for sending and receiving raw packets.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The ADAMANTIUM Multimedia Content Manage- ment System for Real Time Cross-Layer Adaptation of IPTV and VoIP Services over IMS

IMS entails novel business opportunities for pioneering and emerging multimedia services, such as IPTV and VoIP video call applications. However, this strong commercial interest on this promising convergent IMS environment is balanced by the lack of efficient user/customer-centric network management mechanisms. ADAMANTIUM proposes an IMS-compatible Multimedia Content Management System (MCMS) fo...

متن کامل

A Distributed Security Mechanism for Resource-Constrained IoT Devices

Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resourceconstrained in terms of secure communication. This paper provides a distributed securi...

متن کامل

Distance-Aware Beamforming for Multiuser Secure Communication Systems

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consid...

متن کامل

Perceptually Enabled and User Centric IMS Architecture: The ADAMANTIUM Project

The predominant candidate for current trend of multimedia services convergence with mobile/fixed networks and broadcast-interactive applications is the IP Multimedia Subsystem (IMS). IMS entails novel business opportunities for pioneering and emerging multimedia services, such as IPTV and VoIP video call applications. However, this strong commercial interest on this promising convergent IMS env...

متن کامل

Optimization of Annealing Process for Totally Printable High-current Superstrate CuInS2 Thin-Film Solar Cells

Planar superstrate CuInS2 (CIS) solar cell devices are fabricated using totally solution-processed deposition methods. A titanium dioxide blocking layer and an In2S3 buffer layer are deposited by the spray pyrolysis method. A CIS2 absorber layer is deposited by the spin coating method using CIS ink prepared by a 1-butylamine solvent-based solution at room temperature. To obtain optimum annealin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009