Abstract
The security of videoconferencing or telephony data transmissions is a very important problem. There are several approaches how to protect communication in general. Videoconferencing or telephony over IP networks is a specific case of security assurance. There are many H.323 clients in the world, no matter whether software or hardware black box. Many of them are closed systems, which are used a lot but with no security. It could be expensive and in some cases complicated to update these clients to provide security functions. This article deals with a relatively cheap, secure and general enough solution of security provision in H.323 networks without need to modify the current H.323 software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fergusson, N., Schneier, B.: Practical Cryptography. Wiley Publishing, Inc, Chichester (2003)
International Telecommunication Union, H.235 Security and encryption for H-series (H.323 and other H.245-based) multimedia terminals, International Telecommunication Union recommendation (2003)
Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. RFC 2401 (1998)
Maughan, D., Shertler, M., Schneider, M., Turner, J.: Internet Security Association and Key Management Protocol (ISAKMP). RFC 2408 (1998)
Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The Secure Real-time Transport Protocol (SRTP). RFC 3711 (2004)
FreeS/WAN project, http://www.freeswan.org
Dierks, T., Allen, C.: The TLS Protocol Version 1.0., RFC 2246 (1999)
OpenVPN project, http://openvpn.sourceforge.net
DNSSEC project web page, http://www.dnssec.net
Krawczyk, H., Bellare, M.: R. Canetti, HMAC: Keyed- Hashing for Message Authentication, RFC 2104 (February 1997)
Internet Assigned Numbers Authority, http://www.iana.org/assignments/protocol-numbers
Information Sciences Institute at University of Southern California, Internet protocol, RFC 791 (1981)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cvrk, L., Zeman, V., Komosny, D. (2005). H.323 Client-Independent Security Approach. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_76
Download citation
DOI: https://doi.org/10.1007/978-3-540-31957-3_76
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25338-9
Online ISBN: 978-3-540-31957-3
eBook Packages: Computer ScienceComputer Science (R0)