Multimedia Tools and Applications

, Volume 53, Issue 2, pp 349–370 | Cite as

Distributed SIP conference management with autonomously authenticated sources and its application to an H.264 videoconferencing software for mobiles

  • Thomas C. Schmidt
  • Gabriel Hege
  • Matthias Wählisch
  • Hans L. Cycon
  • Mark Palkow
  • Detlev Marpe
Article

Abstract

The design of conferencing systems for achieving efficient and flexible communication in a fully distributed, infrastructure-independent fashion is a promising direction, both in terms of research and practical development. In the particular case of video communication, the seamless adaptation to heterogeneous mobile devices poses an additional strong challenge to those seeking for interoperable and easy-to-deploy solutions. In this paper, we make several contributions towards a generic peer-to-peer (P2P) videoconferencing solution that extends into the mobile realm. We describe the essential building blocks for conference management and media distribution that are necessary for a distributed conferencing approach. Establishing a distributed SIP conference focus, participants share the conference according to their individually given capabilities and resources in terms of bandwidth and processing power rather than in a centralized and fixed way. Overall concepts and SIP-primitives for such an autonomous organization are presented. Security issues that derive from this decentralized identity management are resolved by so-called Overlay AuthoCast, a novel use of cryptographically generated identifiers. Furthermore, this work is dedicated to the development of a software-based H.264 video codec implementation and the specific aspects resulting from tuning such a highly resource-intensive software codec to the given target platform of a standard consumer smartphone.

Keywords

SIP-based multimedia conferencing Distributed conference management P2P group communication Sender authentication Cryptographically generated identifiers Mobile videoconferencing Mobile video coding 

References

  1. 1.
    Aura T (2005) Cryptographically generated addresses (CGA). RFC 3972, IETFGoogle Scholar
  2. 2.
    Basso A (2006) Beyond 3G video mobile video telephony: the role of 3G-324M in mobile video services. Multimed Tools Appl 28(1):173–185CrossRefMathSciNetGoogle Scholar
  3. 3.
    Baugher M, McGrew D, Naslund M, Carrara E, Norrman K (2004) The secure real-time transport protocol (SRTP). RFC 3711, IETFGoogle Scholar
  4. 4.
    Baumgart I (2007) Peer-to-peer name service (P2PNS). Internet draft—work in progress 00, IETFGoogle Scholar
  5. 5.
    Bryan D, Matthews P, Shim E, Willis D, Dawkins S (2008) Concepts and terminology for peer to peer SIP. Internet draft—work in progress 02, IETFGoogle Scholar
  6. 6.
    Cho YH, Jeong MS, Nah JW, Lee WH, Park JT (2005) Policy-based distributed management architecture for large-scale enterprise conferencing service using SIP. IEEE J Sel Areas Commun 23(10):1934–1949CrossRefGoogle Scholar
  7. 7.
    Chopra D, Schulzrinne H, Marocco E, Ivov E (2009) Peer-to-peer overlays for real-time communication: security issues and solutions. IEEE Commun Surv Tutor 11(1):4–12CrossRefGoogle Scholar
  8. 8.
    Cox M, Engelschall R, Henson S, Laurie B et al (2009) Openssl. http://www.openssl.org
  9. 9.
    Cycon HL, Schmidt TC, Hege G, Wählisch M, Marpe D, Palkow M (2008) Peer-to-peer videoconferencing with H.264 software codec for mobiles. In: Jain R, Kumar M (eds) WoWMoM08—The 9th IEEE international symposium on a world of wireless, mobile and multimedia networks—workshop on mobile video delivery (MoViD). IEEE, Piscataway, pp 1–6Google Scholar
  10. 10.
    Durresi A, Durresi M, Barolli L (2008) Secure authentication in heterogeneous wireless networks. Mob Inf Syst 4(2):119–130Google Scholar
  11. 11.
    Faichney J, Gonzalez R (2001) Video coding for mobile handheld conferencing. Multimed Tools Appl 13(2):165–176CrossRefMATHGoogle Scholar
  12. 12.
    Gehlen G, Aijaz F, Zhu Y, Walke B (2007) Mobile P2P web services using SIP. Mob Inf Syst 3(3–4):165–185Google Scholar
  13. 13.
    ITU-T Recommendation H.264 & ISO/IEC 14496-10 AVC (2005) Advanced video coding for generic audiovisual services. Tech. rep., ITU (draft version 3)Google Scholar
  14. 14.
    ITU-T Recommendation H.323 (2000) Infrastructure of audio-visual services—systems and terminal equipment for audio-visual services: packet-based multimedia communications systems. Tech. rep., ITU (draft version 4)Google Scholar
  15. 15.
    Jennings C, Lowekamp B, Rescorla E, Baset S, Schulzrinne H (2008) Resource location and discovery (RELOAD). Internet draft—work in progress 00, IETFGoogle Scholar
  16. 16.
    Johnston A, Levin O (2006) Session Initiation Protocol (SIP) call control—conferencing for user agents. RFC 4579, IETFGoogle Scholar
  17. 17.
    Mahy R, Sparks R, Rosenberg J, Petrie D, Johnston A (2008) A call control and multi-party usage framework for the Session Initiation Protocol (SIP). Internet draft—work in progress 10, IETFGoogle Scholar
  18. 18.
    Ostermann J, Bormans J, List P, Marpe D, Narroschke N, Pereira F, Stockhammer T, Wedi T (2004) Video coding with H.264/AVC: tools, performance and complexity. IEEE Circuits Syst Mag 4(1):7–28CrossRefGoogle Scholar
  19. 19.
    Palkow M (2009) The daViKo homepage. http://www.daviko.com
  20. 20.
    Prasad R, Dovrolis C, Murray M, kc claffy (2003) Bandwidth estimation: metrics, measurement techniques, and tools. IEEE Netw 17(6):27–35CrossRefGoogle Scholar
  21. 21.
    Romano S, Amirante A, Castaldi T, Miniero L, Buono A (2008) Requirements for distributed conferencing. Internet draft—work in progress 04, IETFGoogle Scholar
  22. 22.
    Rosenberg J, Schulzrinne H (2002) An offer/answer model with Session Description Protocol (SDP). RFC 3264, IETFGoogle Scholar
  23. 23.
    Rosenberg J, Schulzrinne H, Camarillo G, Johnston A, Peterson J, Sparks R, Handley M, Schooler E (2002) SIP: Session Initiation Protocol. RFC 3261, IETFGoogle Scholar
  24. 24.
    Rosenberg J, Schulzrinne H, Levin O (2006) A Session Initiation Protocol (SIP) event package for conference state. RFC 4575, IETFGoogle Scholar
  25. 25.
    Schmidt TC, Wählisch M (2008) Group conference management with SIP. In: Ahson S, Ilyas M (eds) SIP handbook: services, technologies, and security. CRC, Boca Raton, pp 123–158Google Scholar
  26. 26.
    Schmidt TC, Wählisch M, Christ O, Hege G (2008) AuthoCast—a mobility-compliant protocol framework for multicast sender authentication. Secur Commun Netw 1(6):495–509 (special issue on secure multimedia communications)CrossRefGoogle Scholar
  27. 27.
    Schmidt TC, Wählisch M, Fairhurst G (2010) Multicast mobility in mobile IP version 6 (MIPv6): problem statement and brief survey, Internet RFC, No 5757Google Scholar
  28. 28.
    Schneier B (1995) Applied cryptography, 2nd edn. Wiley, HobokenGoogle Scholar
  29. 29.
    Schwarz H, Marpe D, Wiegand T (2007) Overview of the scalable video coding extension of the H.264/AVC Standard. IEEE Trans Circuits Syst Video Technol 17(9):1103–1120CrossRefGoogle Scholar
  30. 30.
    Seedorf J (2006) Using cryptographically generated SIP-URIs to protect the integrity of content in P2P-SIP. In: 3rd annual VoIP security workshop. Berlin, GermanyGoogle Scholar
  31. 31.
    Steinmetz R, Wehrle K (eds) (2005) Peer-to-peer systems and applications. LNCS, vol 3485. Springer, BerlinGoogle Scholar
  32. 32.
    The Skype homepage (2009) http://www.skype.com
  33. 33.
    The Speex projectpage (2009) http://www.speex.org
  34. 34.
    VideoLan: x264—a free h264/avc encoder (2009) http://www.videolan.org/developers/x264.html
  35. 35.
    Wählisch M, Schmidt TC, Hege G (2009) Overlay authocast: distributed sender authentication in overlay multicast. In: Proceedings of the 28th IEEE INFOCOM. IEEE, PiscatawayGoogle Scholar
  36. 36.
    Wählisch M, Schmidt TC, Wittenburg G (2009) BIDIR-SAM: large-scale content distribution in structured overlay networks. In: Younis M, Chou CT (eds) Proc. of the 34th IEEE conference on local computer networks (LCN). IEEE Computer Society, Los Alamitos, pp 372–375Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Thomas C. Schmidt
    • 1
  • Gabriel Hege
    • 1
  • Matthias Wählisch
    • 2
  • Hans L. Cycon
    • 3
  • Mark Palkow
    • 4
  • Detlev Marpe
    • 5
  1. 1.Department InformatikHAW HamburgHamburgGermany
  2. 2.Inst. für InformatikFreie Universität BerlinBerlinGermany
  3. 3.HTW BerlinBerlinGermany
  4. 4.daviko GmbHBerlinGermany
  5. 5.Fraunhofer Institute for Telecommunications—Heinrich Hertz Institute (HHI)BerlinGermany

Personalised recommendations