Abstract
International Standards Committees like ITU and IETF have produced several security protocols for real-time multimedia communications. But, applying those security mechanisms may results in non-trivial degradation to real-time communications. This paper investigates the impacts of the standard security protocols on the delay, packet overhead, quality of service, and other features of real-time communications. Some of analytical and experimental results show the suitability of the security protocols.
This work was supported by Korea Research Foundation Grant (KRF-2001-042-E00045).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ITU-T Recommendation H.323 Version 4: Packet Based Multimedia Communication Systems (2000)
ITU-T Recommendation H.225.0 Version 4: Call Signaling Protocols and Media Stream Packetization for Packet Based Multimedia Communications Systems (2000)
ITU-T Recommendation H.245 Version 7: Control Protocol for Multimedia Communication (2000)
Handley, M., Schulzrinne, H., Schooler, E., Rosenberg, J.: SIP: Session Initiation Protocol, IETF RFC 3261 (2002)
Schulzrinne, H., Rao, A., Lanphier, R.: Real Time Streaming Protocol (RTSP), IETF RFC 2326 (1998)
Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, IETF RFC 2401 (1998)
Dierks, T., Allen, C.: The TLS Protocol Version 1.0, IETF RFC 2246 (1999)
ITU-T Recommendation H.235 Version 2: Security and encryption for H-Series (H.323 and other H.245-based) mulitmedia terminals (2000)
Baugher, M., McGrew, D., Oran, D., Blom, R., Carrara, E., Naslund, M., Norrman, K.: The Secure Real-time Transport Protocol, IETF RFC 3711 (2004)
Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), IETF RFC 2409 (1998)
Schulzrinne, H., Casner, S., Frederik, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications, IETF RFC 1889 (1996)
Schulzrinne, H.: RTP Profile for Audio and Video Conferences with Minimal Control. IETF RFC 1890 (1996)
Lo Iacono, L., Ruland, C.: Confidential Multimedia Communication in IP Networks. In: Proceedings of 8th IEEE International Conference on Communication Systems, Singapur (2002)
NIST: Advanced Encryption Standard (AES), FIPS PUB 197 (2001)
ISO/IEC 10116: Information technology - Security techniques - Modes of operation for an n-bit blockcipher, International Organization for Standardization (1997)
McGrew, D.: Segmented Integer Counter Mode: Specification and Rationale, Cisco Systems, Inc. (2000)
Diffie, W., Hellman, M.: Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE 67(3), 397–427 (1979)
Technical Specification Group Services and System Aspects: Specification of the 3GPP Confidentiality and Integrity Algorithms, 3rd Generation Partnership Project (3GPP), Technical Specification, Document 1: f8 and f9 Specification (2001)
Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication, IETF RFC 2104 (1997)
Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Perrig, A., Canetti, R., Briscoe, B., Tygar, J., Song, D.X.: TESLA: Multicast Source Authentication Transform, IETF Internet Draft (Work in progress) (2000)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Symposium on Security and Privacy, pp. 56–73 (2000)
Ruland, C., Schweitzer, N., Lo Iacono, L.: Signing Digital Streams. In: Proceedings of the 4th International ITG Conference on Source and Channel Coding. VDE-Verlag, Berlin (2002)
Arkko, J., Carrara, E., Lindholm, F., Naslund, M., Norrman, K.: MIKEY: Multimedia Internet KEYing, IETF RFC 3830 (2004)
RSA Security: PKCS #7: Cryptographic Message Syntax Standard, Version 1.5, Revised November 1 (1993)
Daeman, J.: Cipher and Hash Function Design, Ph.D. Thesis, Katholieke Universiteit Leuven (1995)
Koren, T., Casner, S., Geevarghese, J., Thonpson, B., Ruddy, P.: Enhanced Compressed RTP (CRTP) for links with high delay, packet loss and reordering, IETF RFC 3545 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hong, K., Jung, S., Lo Iacono, L., Ruland, C. (2005). Impacts of Security Protocols on Real-Time Multimedia Communications. In: Lim, C.H., Yung, M. (eds) Information Security Applications. WISA 2004. Lecture Notes in Computer Science, vol 3325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-31815-6_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24015-0
Online ISBN: 978-3-540-31815-6
eBook Packages: Computer ScienceComputer Science (R0)