Advertisement

Impacts of Security Protocols on Real-Time Multimedia Communications

  • Kihun Hong
  • Souhwan Jung
  • Luigi Lo Iacono
  • Christoph Ruland
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3325)

Abstract

International Standards Committees like ITU and IETF have produced several security protocols for real-time multimedia communications. But, applying those security mechanisms may results in non-trivial degradation to real-time communications. This paper investigates the impacts of the standard security protocols on the delay, packet overhead, quality of service, and other features of real-time communications. Some of analytical and experimental results show the suitability of the security protocols.

Keywords

Security Protocol Advance Encryption Standard Message Authentication Multimedia Communication Cipher Block Chain 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    ITU-T Recommendation H.323 Version 4: Packet Based Multimedia Communication Systems (2000) Google Scholar
  2. 2.
    ITU-T Recommendation H.225.0 Version 4: Call Signaling Protocols and Media Stream Packetization for Packet Based Multimedia Communications Systems (2000) Google Scholar
  3. 3.
    ITU-T Recommendation H.245 Version 7: Control Protocol for Multimedia Communication (2000) Google Scholar
  4. 4.
    Handley, M., Schulzrinne, H., Schooler, E., Rosenberg, J.: SIP: Session Initiation Protocol, IETF RFC 3261 (2002)Google Scholar
  5. 5.
    Schulzrinne, H., Rao, A., Lanphier, R.: Real Time Streaming Protocol (RTSP), IETF RFC 2326 (1998)Google Scholar
  6. 6.
    Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, IETF RFC 2401 (1998)Google Scholar
  7. 7.
    Dierks, T., Allen, C.: The TLS Protocol Version 1.0, IETF RFC 2246 (1999) Google Scholar
  8. 8.
    ITU-T Recommendation H.235 Version 2: Security and encryption for H-Series (H.323 and other H.245-based) mulitmedia terminals (2000) Google Scholar
  9. 9.
    Baugher, M., McGrew, D., Oran, D., Blom, R., Carrara, E., Naslund, M., Norrman, K.: The Secure Real-time Transport Protocol, IETF RFC 3711 (2004)Google Scholar
  10. 10.
    Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), IETF RFC 2409 (1998) Google Scholar
  11. 11.
    Schulzrinne, H., Casner, S., Frederik, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications, IETF RFC 1889 (1996)Google Scholar
  12. 12.
    Schulzrinne, H.: RTP Profile for Audio and Video Conferences with Minimal Control. IETF RFC 1890 (1996)Google Scholar
  13. 13.
    Lo Iacono, L., Ruland, C.: Confidential Multimedia Communication in IP Networks. In: Proceedings of 8th IEEE International Conference on Communication Systems, Singapur (2002)Google Scholar
  14. 14.
    NIST: Advanced Encryption Standard (AES), FIPS PUB 197 (2001) Google Scholar
  15. 15.
    ISO/IEC 10116: Information technology - Security techniques - Modes of operation for an n-bit blockcipher, International Organization for Standardization (1997) Google Scholar
  16. 16.
    McGrew, D.: Segmented Integer Counter Mode: Specification and Rationale, Cisco Systems, Inc. (2000)Google Scholar
  17. 17.
    Diffie, W., Hellman, M.: Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE 67(3), 397–427 (1979)CrossRefGoogle Scholar
  18. 18.
    Technical Specification Group Services and System Aspects: Specification of the 3GPP Confidentiality and Integrity Algorithms, 3rd Generation Partnership Project (3GPP), Technical Specification, Document 1: f8 and f9 Specification (2001) Google Scholar
  19. 19.
    Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication, IETF RFC 2104 (1997)Google Scholar
  20. 20.
    Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)Google Scholar
  21. 21.
    Perrig, A., Canetti, R., Briscoe, B., Tygar, J., Song, D.X.: TESLA: Multicast Source Authentication Transform, IETF Internet Draft (Work in progress) (2000)Google Scholar
  22. 22.
    Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Symposium on Security and Privacy, pp. 56–73 (2000)Google Scholar
  23. 23.
    Ruland, C., Schweitzer, N., Lo Iacono, L.: Signing Digital Streams. In: Proceedings of the 4th International ITG Conference on Source and Channel Coding. VDE-Verlag, Berlin (2002)Google Scholar
  24. 24.
    Arkko, J., Carrara, E., Lindholm, F., Naslund, M., Norrman, K.: MIKEY: Multimedia Internet KEYing, IETF RFC 3830 (2004)Google Scholar
  25. 25.
    RSA Security: PKCS #7: Cryptographic Message Syntax Standard, Version 1.5, Revised November 1 (1993) Google Scholar
  26. 26.
    Daeman, J.: Cipher and Hash Function Design, Ph.D. Thesis, Katholieke Universiteit Leuven (1995)Google Scholar
  27. 27.
    Koren, T., Casner, S., Geevarghese, J., Thonpson, B., Ruddy, P.: Enhanced Compressed RTP (CRTP) for links with high delay, packet loss and reordering, IETF RFC 3545 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Kihun Hong
    • 1
  • Souhwan Jung
    • 1
  • Luigi Lo Iacono
    • 2
  • Christoph Ruland
    • 2
  1. 1.School of Electronic EngineeringSoongsil UniversitySeoulKorea
  2. 2.Institute for Data Communications SystemsUniversity of SiegenGermany

Personalised recommendations