Skip to main content

H.323 Client-Independent Security Approach

  • Conference paper
Networking - ICN 2005 (ICN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3421))

Included in the following conference series:

Abstract

The security of videoconferencing or telephony data transmissions is a very important problem. There are several approaches how to protect communication in general. Videoconferencing or telephony over IP networks is a specific case of security assurance. There are many H.323 clients in the world, no matter whether software or hardware black box. Many of them are closed systems, which are used a lot but with no security. It could be expensive and in some cases complicated to update these clients to provide security functions. This article deals with a relatively cheap, secure and general enough solution of security provision in H.323 networks without need to modify the current H.323 software.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fergusson, N., Schneier, B.: Practical Cryptography. Wiley Publishing, Inc, Chichester (2003)

    Google Scholar 

  2. International Telecommunication Union, H.235 Security and encryption for H-series (H.323 and other H.245-based) multimedia terminals, International Telecommunication Union recommendation (2003)

    Google Scholar 

  3. Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. RFC 2401 (1998)

    Google Scholar 

  4. Maughan, D., Shertler, M., Schneider, M., Turner, J.: Internet Security Association and Key Management Protocol (ISAKMP). RFC 2408 (1998)

    Google Scholar 

  5. Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The Secure Real-time Transport Protocol (SRTP). RFC 3711 (2004)

    Google Scholar 

  6. FreeS/WAN project, http://www.freeswan.org

  7. Dierks, T., Allen, C.: The TLS Protocol Version 1.0., RFC 2246 (1999)

    Google Scholar 

  8. OpenVPN project, http://openvpn.sourceforge.net

  9. DNSSEC project web page, http://www.dnssec.net

  10. Krawczyk, H., Bellare, M.: R. Canetti, HMAC: Keyed- Hashing for Message Authentication, RFC 2104 (February 1997)

    Google Scholar 

  11. Internet Assigned Numbers Authority, http://www.iana.org/assignments/protocol-numbers

  12. Information Sciences Institute at University of Southern California, Internet protocol, RFC 791 (1981)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cvrk, L., Zeman, V., Komosny, D. (2005). H.323 Client-Independent Security Approach. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_76

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31957-3_76

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25338-9

  • Online ISBN: 978-3-540-31957-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics