ABSTRACT
In LTE, voice calls are encrypted only over the wireless link between the Mobile Equipment and the eNodeB. A secure end-to-end voice is left untreated. To solve this, 3GPP proposed to use IPsec, but this is still optional for operators. This article brings this end-to-end encryption of voice over LTE, namely VoLTE, without depending on the policies of the operator (IPsec is used or not). After calculation, it was found that, the delay for encrypting and decrypting one VoIP packet must be less than or equal to 30 ms to obtain HD-Voice. This delay reduces the bool of cipher candidates to AES as a block cipher and Chacha as a stream cipher, since both resistance and speed are now mandatory. However, securing data consumes resources, i.e. ciphers consumes both time and energy. Due to the processing requirements and the limited computing power in many smartphones, using strong ciphers may consume more energy and drain the battery faster than using less secure ciphers. It may also significantly increase the delay between data transmissions. Therefore, users and companies need to be aware of the benefits and costs of using various ciphers. Therefore, this paper presents the estimated battery discharge-equation over time for secure VoLLE. These equations will help operators, smartphone manufacturers and users to choose the most convenient cipher to use for VoLTE according to the characteristic of each smartphone.
- Mark Weiser. 1999. The computer for the 21st century. Mobile computing and communications review, 3, 3, 3--11. Google ScholarDigital Library
- 3GPP. 2006. Physical Layer Aspects for Evolved UTRA. Technical Report (TR) 25.814. version 7.1.0. 3rd Generation Partnership Project (3GPP), (September 2006).Google Scholar
- Sjur Tveito Fredriksen. 2015. Security in lte and volte. Uio: institutt for informatikk, det matematisk-naturvitenskapelige fakultet, INF3510, 351, 1--15.Google Scholar
- 3GPP. {n. d.} Technical Specification (TS) 33.401. 3rd Generation Partnership Project (3GPP). http://www.3gpp.org/ftp/specs/archive/33series/33.401/.Google Scholar
- David Martín-Sacristán, Jose F Monserrat, Jorge Cabrejas-Peñuelas, Daniel Calabuig, Salvador Garrigas, and Narcís Cardona. 2009. On the way towards fourth-generation mobile: 3gpp lte and lte-advanced. Eurasip journal on wireless communications and networking, 2009, 1, 354089. Google ScholarDigital Library
- 3GPP. 2010. Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Technical Specification (TS) 36.300. version 8.11.0. 3rd Generation Partnership Project (3GPP), (January 2010).Google Scholar
- Hannes Ekstrom. 2009. Qos control in the 3gpp evolved packet system. Ieee communications magazine, 47, 2, 76--83. Google ScholarDigital Library
- 3GPP. 2012. Policy and charging control architecture. Technical Specification (TS) 23.203. Release 11. 3rd Generation Partnership Project (3GPP).Google Scholar
- 3GPP. 2011. Circuit Switched (CS) fallback in Evolved Packet System (EPS). Technical Specification (TS) 23.272. Stage 2 Release 10. 3rd Generation Partnership Project (3GPP).Google Scholar
- Fredrik Persson. 2007. Voice over ip realized for the 3gpp long term evolution. In Vehicular technology conference, 2007. vtc-2007 fall. 2007 ieee 66th. IEEE, 1436--1440.Google Scholar
- 3GPP TR 25.913. 2009. Requirements for evolved utra (e-utra) and evolved utran (e-utran).Google Scholar
- Md Masum and Md Babu. 2011. End-to-end delay performance evaluation for voip in the lte network.Google Scholar
- ITUTG ITU. 1996. 723.1: dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 kbit/s. Telecommunication standardization sector of itu.Google Scholar
- International Telecommunication Union. Telecommunication Standardization Sector. 2006. Implementors' guide for g.729. ITU-T.Google Scholar
- Alessandro Vizzarri. 2014. Analysis of volte end-to-end quality of service using opnet. In Modelling symposium (ems), 2014 european. IEEE, 452--457. Google ScholarDigital Library
- One-Way Transmission Time. 2000. Itu-t recommendation g. 114. Itu-t may.Google Scholar
- Edward Paul Guillen and Diego Alejandro Chacon. 2009. Voip networks performance analysis with encryption systems. World academy of science, engineering and technology, 58, 15.Google Scholar
- Youssef Harmouch and Rachid El Kouch. 2017. A fair comparison between several ciphers in characteristics, safety and speed test. In Europe and mena cooperation advances in information and communication technologies. Springer, 535--547.Google Scholar
- Youssef Harmouch and Rachid El Kouch. 2017. A statistical analysis for high-speed stream ciphers. In International conference on innovations in bio-inspired computing and applications. Springer, 339--349.Google Scholar
- Nachiketh R Potlapally, Srivaths Ravi, Anand Raghunathan, and Niraj K Jha. 2003. Analyzing the energy consumption of security protocols. In Proceedings of the 2003 international symposium on low power electronics and design. ACM, 30--35. Google ScholarDigital Library
- Creighton TR Hager, Scott F Midkiff, J-M Park, and Thomas L Martin. 2005. Performance and energy efficiency of block ciphers in personal digital assistants. In Pervasive computing and communications, 2005. percom 2005. third ieee international conference on. IEEE, 127--136. Google ScholarDigital Library
- Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, et al. 2012. Compact implementation and performance evaluation of block ciphers in attiny devices. In International conference on cryptology in africa. Springer, 172--187. Google ScholarDigital Library
- Yee Wei Law, Jeroen Doumen, and Pieter Hartel. 2006. Survey and benchmark of block ciphers for wireless sensor networks. Acm transactions on sensor networks (tosn), 2, 1, 65--93. Google ScholarDigital Library
- Nicolas Fournel, Marine Minier, and Stéphane Ubéda. 2007. Survey and benchmark of stream ciphers for wireless sensor networks. In Ifip international workshop on information security theory and practices. Springer, 202--214. Google ScholarDigital Library
- Johann Grossschadl, Stefan Tillich, Christian Rechberger, Michael Hofmann, and Marcel Medwed. 2007. Energy evaluation of software implementations of block ciphers under memory constraints. In Design, automation & test in europe conference & exhibition, 2007. date'07. IEEE, 1--6. Google ScholarDigital Library
- Subhadeep Banik, Andrey Bogdanov, and Francesco Regazzoni. 2015. Exploring energy efficiency of lightweight block ciphers. In International conference on selected areas in cryptography. Springer, 178--194. Google ScholarDigital Library
- Xueying Zhang, Howard M Heys, and Cheng Li. 2010. Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks. In Communications (qbsc), 2010 25th biennial symposium on. IEEE, 168--172.Google Scholar
- Lejla Batina, Joseph Lano, Nele Mentens, Bart Preneel, Ingrid Verbauwhede, and Siddika Berna Örs. 2004. Energy, performance, area versus security trade-offs for stream ciphers. In Ecrypt workshop sasc-the state-of-the art of stream ciphers, 302--310.Google Scholar
- Martin Hell, Thomas Johansson, and Willi Meier. 2007. Grain: a stream cipher for constrained environments. International journal of wireless and mobile computing, 2, 1, 86--93. Google ScholarDigital Library
- Suhaila Omer Sharif and SP Mansoor. 2010. Performance analysis of stream and block cipher algorithms. In Advanced computer theory and engineering (icacte), 2010 3rd international conference on. Volume 1. IEEE, V1--522.Google Scholar
Index Terms
- Battery Discharge Equation for a Secure VoLTE
Recommendations
Energy harvesting discontinuous reception (DRX) mechanism in wireless powered cellular networks
The energy harvesting paradigm enables the design of new wireless powered cellular networks (WPCNs) for the Internet‐of‐Things (IoT). In a WPCN, if the harvested energy is larger than the consumed energy, an IoT device may utilise the surplus harvested ...
Solution to Reduce Voice Interruption Time during Handover of VoLTE Call in Enhanced Single Radio Voice Call Continuity
ACCT '15: Proceedings of the 2015 Fifth International Conference on Advanced Computing & Communication TechnologiesLTE network is a packet switched based network, which does not support circuit switched network feature like voice call. Operators have been trying to deploy LTE network in phases and in parallel they are supporting legacy networks too. It is necessary ...
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications SecurityLong Term Evolution (LTE) is becoming the dominant cellular networking technology, shifting the cellular network away from its circuit-switched legacy towards a packet-switched network that resembles the Internet. To support voice calls over the LTE ...
Comments