Uvoip: Cross-layer Optimization of Buffer Operations for Providing Secure Voip Services on Constrained Embedded Devices
نویسندگان
چکیده
In this paper, we present an optimized implementation of secure VoIP protocol stack so that the stack would fit into the memory and computation budget of constrained embedded systems. The novel approach that we take to achieve this is to perform cross-layer optimization of buffers and buffer operations. Buffers and buffer operations are involved in playback, capture, codec transformations, and network I/O. Following this approach, we have implemented VoIP application functions, RTP, and Secure RTP protocols in a tightly integrated and highly optimized manner, on the top of the embedded TCP/IP stack, uIP. We call the protocol stack thus constructed, the uVoIP stack. We have tested the uVoIP stack in GNU/Linux Operating System using tunnel device for sending and receiving raw packets.
منابع مشابه
The ADAMANTIUM Multimedia Content Manage- ment System for Real Time Cross-Layer Adaptation of IPTV and VoIP Services over IMS
IMS entails novel business opportunities for pioneering and emerging multimedia services, such as IPTV and VoIP video call applications. However, this strong commercial interest on this promising convergent IMS environment is balanced by the lack of efficient user/customer-centric network management mechanisms. ADAMANTIUM proposes an IMS-compatible Multimedia Content Management System (MCMS) fo...
متن کاملA Distributed Security Mechanism for Resource-Constrained IoT Devices
Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resourceconstrained in terms of secure communication. This paper provides a distributed securi...
متن کاملDistance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملPerceptually Enabled and User Centric IMS Architecture: The ADAMANTIUM Project
The predominant candidate for current trend of multimedia services convergence with mobile/fixed networks and broadcast-interactive applications is the IP Multimedia Subsystem (IMS). IMS entails novel business opportunities for pioneering and emerging multimedia services, such as IPTV and VoIP video call applications. However, this strong commercial interest on this promising convergent IMS env...
متن کاملOptimization of Annealing Process for Totally Printable High-current Superstrate CuInS2 Thin-Film Solar Cells
Planar superstrate CuInS2 (CIS) solar cell devices are fabricated using totally solution-processed deposition methods. A titanium dioxide blocking layer and an In2S3 buffer layer are deposited by the spray pyrolysis method. A CIS2 absorber layer is deposited by the spin coating method using CIS ink prepared by a 1-butylamine solvent-based solution at room temperature. To obtain optimum annealin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009