Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Performance Analysis of Virtual Private Network for Securing Voice and Video Traffic

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 46 - Number 16
Year of Publication: 2012
Aruna Malik
Harsh K Verma

Aruna Malik and Harsh K Verma. Article: Performance Analysis of Virtual Private Network for Securing Voice and Video Traffic. International Journal of Computer Applications 46(16):25-30, May 2012. Full text available. BibTeX

	author = {Aruna Malik and Harsh K Verma},
	title = {Article: Performance Analysis of Virtual Private Network for Securing Voice and Video Traffic},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {46},
	number = {16},
	pages = {25-30},
	month = {May},
	note = {Full text available}


Security and privacy become mandatory requirements for voice and video communications that needs security services such as confidentiality, integrity, authentication, non-replay and non repudiation. Stringent quality of service (QOS) maintenance for voice & video communication is a major challenge. New security solutions must take into account the real-time constraint of voice & video and their mechanisms should address possible attacks and overhead associated with it. Nowadays, Virtual Private Networks (VPNs) is considered the strongest security solutions for multimedia communications over IP networks. In this paper, analysis and experimental results for an evaluation of the QOS of voice and video traffic are presented. A comprehensive set of measurements like packet delay variation, Mean Opinion Score (MOS), packet end to end delay, traffic received, traffic sent are obtained . These results are further analysed to study the effect of VPN on these parameters. Experimental results confirm that, depending on the type of the traffic, the overall security of the networks is improved, with a reasonable decrease in term of performance.


  • S. Narayan , S. S. Kolahi, K. Brooking, and S. D. Veres, "Performance evaluation of virtual private network protocols in windows 2003 environment",International Conference on Advanced Computer Theory and Engineering 978-0-7695-3489-3/08 2008.
  • S. Khanvilkar and A. Khokhar "Virtual Private Networks: An Overview with Performance Evaluation", Communications Magazine 2004, pp 146 – 154.
  • A. Nadeem and M. Y. Javed, "A Performance Comparison of Data Encryption Algorithms," Information and Communication Technologies, ICICT 2005, pp. 84 - 89.
  • J. A. Pérez, V. Zárate, Á. Monte and C. García, "Quality of Service Analysis of IPSec VPNs for Voice and Video Traffic",in IEEE Proceedings of the advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006)0-7695-2522-9/06 2006.
  • N. Doraswamy and H. Dan, "IPSec the New Security Standard for the Internet, Intranets, and Virtual Private Networks", Prentice Hall PTR Internet Infrastructure Series, 1999, ISBN 013011898.
  • R. Barbieri, D. Bruschi and E. Rosti , "Voice over IPsec: analysis and solutions", Proceedings of the IEEE Computer Security Application Conference, 9-13 Dec. 2002, pp. 261 –270
  • W. Qu and S. Srinivas , "IPSec-based secure wireless virtual private network", IEEE MILCOM 2002 proceedings , Vol. 2 ,7-10 Oct. 2002, pp. 1107 – 1112.
  • S. Khanvilkar and A. Khokhar, "Virtual private networks: an overview with performance evaluation", IEEE Communications Magazine, Vol. 42, Issue: 10, Oct. 2004, pp: 146 – 154.
  • D. Khatavkar, E. R Hixon, R. Pendse, "Quantizing the throughput reduction of IPSec with mobile IP", Circuits and Systems, MWSCAS-2002, Vol. 3, 4-7Aug. 2002, pp: III-505 -III-508.
  • G. C. Hadjichristofi, N. J. Davis and S. F. Midkiff, "IPSec overhead in wire line and wireless networks for Web and email applications", Conference Proceedings of the IEEE International Performance, Computing, and Communications, 9-11April 2003, pp. 543 – 547.
  • S. Hyatt. , S. A. Shaikh, B. Akhgar and J. Siddiqi ,"Performance of multimedia applications with IPSec tunneling", IEEE Proceedings of International Conference on Coding and Computing, 8-10 April 2002, pp. 134 – 138.
  • O. Elkeelany, M. M. Matalgah, K. P. Sheikh, M. Thaker, G. Chaudhry, D. Medhi and J. Qaddouri, "Performance analysis of IPSec protocol: encryption and authentication", IEEE International Conference on Communications, ICC,Vol. 2, 28April-2May 2002, pp. 1164 – 1168.
  • S. Kebreau, B. Constantinescu and S. Pierre, "A New Security Approach for WLAN", IEEE 1-4244-0038-4 2006.
  • M. S. Gast, "802. 11 Wireless Networks: The Definitive Guide", Editor O'Reilly, April, 2002.
  • R. Malik and R. Syal, "Performance Analysis of IP Security VPN", International Journal of Computer Applications (0975 – 8887) Volume 8– No. 4, October 2010