skip to main content
10.1145/3289402.3289506acmotherconferencesArticle/Chapter ViewAbstractPublication PagessitaConference Proceedingsconference-collections
research-article

Battery Discharge Equation for a Secure VoLTE

Authors Info & Claims
Published:24 October 2018Publication History

ABSTRACT

In LTE, voice calls are encrypted only over the wireless link between the Mobile Equipment and the eNodeB. A secure end-to-end voice is left untreated. To solve this, 3GPP proposed to use IPsec, but this is still optional for operators. This article brings this end-to-end encryption of voice over LTE, namely VoLTE, without depending on the policies of the operator (IPsec is used or not). After calculation, it was found that, the delay for encrypting and decrypting one VoIP packet must be less than or equal to 30 ms to obtain HD-Voice. This delay reduces the bool of cipher candidates to AES as a block cipher and Chacha as a stream cipher, since both resistance and speed are now mandatory. However, securing data consumes resources, i.e. ciphers consumes both time and energy. Due to the processing requirements and the limited computing power in many smartphones, using strong ciphers may consume more energy and drain the battery faster than using less secure ciphers. It may also significantly increase the delay between data transmissions. Therefore, users and companies need to be aware of the benefits and costs of using various ciphers. Therefore, this paper presents the estimated battery discharge-equation over time for secure VoLLE. These equations will help operators, smartphone manufacturers and users to choose the most convenient cipher to use for VoLTE according to the characteristic of each smartphone.

References

  1. Mark Weiser. 1999. The computer for the 21st century. Mobile computing and communications review, 3, 3, 3--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 3GPP. 2006. Physical Layer Aspects for Evolved UTRA. Technical Report (TR) 25.814. version 7.1.0. 3rd Generation Partnership Project (3GPP), (September 2006).Google ScholarGoogle Scholar
  3. Sjur Tveito Fredriksen. 2015. Security in lte and volte. Uio: institutt for informatikk, det matematisk-naturvitenskapelige fakultet, INF3510, 351, 1--15.Google ScholarGoogle Scholar
  4. 3GPP. {n. d.} Technical Specification (TS) 33.401. 3rd Generation Partnership Project (3GPP). http://www.3gpp.org/ftp/specs/archive/33series/33.401/.Google ScholarGoogle Scholar
  5. David Martín-Sacristán, Jose F Monserrat, Jorge Cabrejas-Peñuelas, Daniel Calabuig, Salvador Garrigas, and Narcís Cardona. 2009. On the way towards fourth-generation mobile: 3gpp lte and lte-advanced. Eurasip journal on wireless communications and networking, 2009, 1, 354089. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 3GPP. 2010. Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Technical Specification (TS) 36.300. version 8.11.0. 3rd Generation Partnership Project (3GPP), (January 2010).Google ScholarGoogle Scholar
  7. Hannes Ekstrom. 2009. Qos control in the 3gpp evolved packet system. Ieee communications magazine, 47, 2, 76--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 3GPP. 2012. Policy and charging control architecture. Technical Specification (TS) 23.203. Release 11. 3rd Generation Partnership Project (3GPP).Google ScholarGoogle Scholar
  9. 3GPP. 2011. Circuit Switched (CS) fallback in Evolved Packet System (EPS). Technical Specification (TS) 23.272. Stage 2 Release 10. 3rd Generation Partnership Project (3GPP).Google ScholarGoogle Scholar
  10. Fredrik Persson. 2007. Voice over ip realized for the 3gpp long term evolution. In Vehicular technology conference, 2007. vtc-2007 fall. 2007 ieee 66th. IEEE, 1436--1440.Google ScholarGoogle Scholar
  11. 3GPP TR 25.913. 2009. Requirements for evolved utra (e-utra) and evolved utran (e-utran).Google ScholarGoogle Scholar
  12. Md Masum and Md Babu. 2011. End-to-end delay performance evaluation for voip in the lte network.Google ScholarGoogle Scholar
  13. ITUTG ITU. 1996. 723.1: dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 kbit/s. Telecommunication standardization sector of itu.Google ScholarGoogle Scholar
  14. International Telecommunication Union. Telecommunication Standardization Sector. 2006. Implementors' guide for g.729. ITU-T.Google ScholarGoogle Scholar
  15. Alessandro Vizzarri. 2014. Analysis of volte end-to-end quality of service using opnet. In Modelling symposium (ems), 2014 european. IEEE, 452--457. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. One-Way Transmission Time. 2000. Itu-t recommendation g. 114. Itu-t may.Google ScholarGoogle Scholar
  17. Edward Paul Guillen and Diego Alejandro Chacon. 2009. Voip networks performance analysis with encryption systems. World academy of science, engineering and technology, 58, 15.Google ScholarGoogle Scholar
  18. Youssef Harmouch and Rachid El Kouch. 2017. A fair comparison between several ciphers in characteristics, safety and speed test. In Europe and mena cooperation advances in information and communication technologies. Springer, 535--547.Google ScholarGoogle Scholar
  19. Youssef Harmouch and Rachid El Kouch. 2017. A statistical analysis for high-speed stream ciphers. In International conference on innovations in bio-inspired computing and applications. Springer, 339--349.Google ScholarGoogle Scholar
  20. Nachiketh R Potlapally, Srivaths Ravi, Anand Raghunathan, and Niraj K Jha. 2003. Analyzing the energy consumption of security protocols. In Proceedings of the 2003 international symposium on low power electronics and design. ACM, 30--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Creighton TR Hager, Scott F Midkiff, J-M Park, and Thomas L Martin. 2005. Performance and energy efficiency of block ciphers in personal digital assistants. In Pervasive computing and communications, 2005. percom 2005. third ieee international conference on. IEEE, 127--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, et al. 2012. Compact implementation and performance evaluation of block ciphers in attiny devices. In International conference on cryptology in africa. Springer, 172--187. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Yee Wei Law, Jeroen Doumen, and Pieter Hartel. 2006. Survey and benchmark of block ciphers for wireless sensor networks. Acm transactions on sensor networks (tosn), 2, 1, 65--93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Nicolas Fournel, Marine Minier, and Stéphane Ubéda. 2007. Survey and benchmark of stream ciphers for wireless sensor networks. In Ifip international workshop on information security theory and practices. Springer, 202--214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Johann Grossschadl, Stefan Tillich, Christian Rechberger, Michael Hofmann, and Marcel Medwed. 2007. Energy evaluation of software implementations of block ciphers under memory constraints. In Design, automation & test in europe conference & exhibition, 2007. date'07. IEEE, 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Subhadeep Banik, Andrey Bogdanov, and Francesco Regazzoni. 2015. Exploring energy efficiency of lightweight block ciphers. In International conference on selected areas in cryptography. Springer, 178--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Xueying Zhang, Howard M Heys, and Cheng Li. 2010. Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks. In Communications (qbsc), 2010 25th biennial symposium on. IEEE, 168--172.Google ScholarGoogle Scholar
  28. Lejla Batina, Joseph Lano, Nele Mentens, Bart Preneel, Ingrid Verbauwhede, and Siddika Berna Örs. 2004. Energy, performance, area versus security trade-offs for stream ciphers. In Ecrypt workshop sasc-the state-of-the art of stream ciphers, 302--310.Google ScholarGoogle Scholar
  29. Martin Hell, Thomas Johansson, and Willi Meier. 2007. Grain: a stream cipher for constrained environments. International journal of wireless and mobile computing, 2, 1, 86--93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Suhaila Omer Sharif and SP Mansoor. 2010. Performance analysis of stream and block cipher algorithms. In Advanced computer theory and engineering (icacte), 2010 3rd international conference on. Volume 1. IEEE, V1--522.Google ScholarGoogle Scholar

Index Terms

  1. Battery Discharge Equation for a Secure VoLTE

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            SITA'18: Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications
            October 2018
            301 pages
            ISBN:9781450364621
            DOI:10.1145/3289402

            Copyright © 2018 ACM

            Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 24 October 2018

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited
          • Article Metrics

            • Downloads (Last 12 months)1
            • Downloads (Last 6 weeks)0

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader