Nothing Special   »   [go: up one dir, main page]

Skip to main content

Impacts of Security Protocols on Real-Time Multimedia Communications

  • Conference paper
Information Security Applications (WISA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3325))

Included in the following conference series:

Abstract

International Standards Committees like ITU and IETF have produced several security protocols for real-time multimedia communications. But, applying those security mechanisms may results in non-trivial degradation to real-time communications. This paper investigates the impacts of the standard security protocols on the delay, packet overhead, quality of service, and other features of real-time communications. Some of analytical and experimental results show the suitability of the security protocols.

This work was supported by Korea Research Foundation Grant (KRF-2001-042-E00045).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ITU-T Recommendation H.323 Version 4: Packet Based Multimedia Communication Systems (2000)

    Google Scholar 

  2. ITU-T Recommendation H.225.0 Version 4: Call Signaling Protocols and Media Stream Packetization for Packet Based Multimedia Communications Systems (2000)

    Google Scholar 

  3. ITU-T Recommendation H.245 Version 7: Control Protocol for Multimedia Communication (2000)

    Google Scholar 

  4. Handley, M., Schulzrinne, H., Schooler, E., Rosenberg, J.: SIP: Session Initiation Protocol, IETF RFC 3261 (2002)

    Google Scholar 

  5. Schulzrinne, H., Rao, A., Lanphier, R.: Real Time Streaming Protocol (RTSP), IETF RFC 2326 (1998)

    Google Scholar 

  6. Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, IETF RFC 2401 (1998)

    Google Scholar 

  7. Dierks, T., Allen, C.: The TLS Protocol Version 1.0, IETF RFC 2246 (1999)

    Google Scholar 

  8. ITU-T Recommendation H.235 Version 2: Security and encryption for H-Series (H.323 and other H.245-based) mulitmedia terminals (2000)

    Google Scholar 

  9. Baugher, M., McGrew, D., Oran, D., Blom, R., Carrara, E., Naslund, M., Norrman, K.: The Secure Real-time Transport Protocol, IETF RFC 3711 (2004)

    Google Scholar 

  10. Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), IETF RFC 2409 (1998)

    Google Scholar 

  11. Schulzrinne, H., Casner, S., Frederik, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications, IETF RFC 1889 (1996)

    Google Scholar 

  12. Schulzrinne, H.: RTP Profile for Audio and Video Conferences with Minimal Control. IETF RFC 1890 (1996)

    Google Scholar 

  13. Lo Iacono, L., Ruland, C.: Confidential Multimedia Communication in IP Networks. In: Proceedings of 8th IEEE International Conference on Communication Systems, Singapur (2002)

    Google Scholar 

  14. NIST: Advanced Encryption Standard (AES), FIPS PUB 197 (2001)

    Google Scholar 

  15. ISO/IEC 10116: Information technology - Security techniques - Modes of operation for an n-bit blockcipher, International Organization for Standardization (1997)

    Google Scholar 

  16. McGrew, D.: Segmented Integer Counter Mode: Specification and Rationale, Cisco Systems, Inc. (2000)

    Google Scholar 

  17. Diffie, W., Hellman, M.: Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE 67(3), 397–427 (1979)

    Article  Google Scholar 

  18. Technical Specification Group Services and System Aspects: Specification of the 3GPP Confidentiality and Integrity Algorithms, 3rd Generation Partnership Project (3GPP), Technical Specification, Document 1: f8 and f9 Specification (2001)

    Google Scholar 

  19. Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication, IETF RFC 2104 (1997)

    Google Scholar 

  20. Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)

    Google Scholar 

  21. Perrig, A., Canetti, R., Briscoe, B., Tygar, J., Song, D.X.: TESLA: Multicast Source Authentication Transform, IETF Internet Draft (Work in progress) (2000)

    Google Scholar 

  22. Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Symposium on Security and Privacy, pp. 56–73 (2000)

    Google Scholar 

  23. Ruland, C., Schweitzer, N., Lo Iacono, L.: Signing Digital Streams. In: Proceedings of the 4th International ITG Conference on Source and Channel Coding. VDE-Verlag, Berlin (2002)

    Google Scholar 

  24. Arkko, J., Carrara, E., Lindholm, F., Naslund, M., Norrman, K.: MIKEY: Multimedia Internet KEYing, IETF RFC 3830 (2004)

    Google Scholar 

  25. RSA Security: PKCS #7: Cryptographic Message Syntax Standard, Version 1.5, Revised November 1 (1993)

    Google Scholar 

  26. Daeman, J.: Cipher and Hash Function Design, Ph.D. Thesis, Katholieke Universiteit Leuven (1995)

    Google Scholar 

  27. Koren, T., Casner, S., Geevarghese, J., Thonpson, B., Ruddy, P.: Enhanced Compressed RTP (CRTP) for links with high delay, packet loss and reordering, IETF RFC 3545 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hong, K., Jung, S., Lo Iacono, L., Ruland, C. (2005). Impacts of Security Protocols on Real-Time Multimedia Communications. In: Lim, C.H., Yung, M. (eds) Information Security Applications. WISA 2004. Lecture Notes in Computer Science, vol 3325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31815-6_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24015-0

  • Online ISBN: 978-3-540-31815-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics