Skip to main content

A Technology Independent Security Gateway for Real-Time Multimedia Communication

  • Conference paper
Network and System Security (NSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7873))

Included in the following conference series:

  • 3679 Accesses

Abstract

With currently more than 178 million users worldwide, the demand on real-time multimedia communication services (e.g. VoIP, video conference) grows steadily. However, whilst the protocols utilised in such communications are standardised, internal aspects are not. For example, if calling parties utilise incompatible media codecs or security mechanisms, a real-time multimedia communication cannot be established. The latter would result in either a failure to establish a connection or a plaintext connection that leaves the communication open to attacks. This paper proposes a novel technology independent security gateway for real-time multimedia communications which offers ciphering assistance for these terminals when they have incompatible security mechanisms and/or media codecs, allowing them to communicate in a seamless and secure manner despite their incompatibilities. The proposed security gateway operates across standard IP protocols and provides a flexible, scalable and robust system that is capable of managing the ciphering requirements of a modern communications system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Aiache, H., Knopp, R., Koufos, K., Salovuori, H., Simon, P.: Increasing Public Safety Communications Interoperability: The CHORIST Broadband and Wideband Rapidly Deployable Systems. In: IEEE International Conference on Communications Workshops, ICC Workshops 2009, June 14-18, pp. 1–6 (2009), doi:10.1109/ICCW.2009.5208003

    Google Scholar 

  2. Infonetics Research: VoIP services market growing strong as businesses seek flexibility, easier management (2012), http://www.infonetics.com/pr/2012/VoIP-UC-Services-Market-Forecast-and-SIP-Trunking-Survey-Highlights.asp

  3. Myvoiprovider: Top 100 VoIP Provider World Ranking (2012), http://www.myvoipprovider.com/en/Top_100_VoIP_Providers

  4. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC3261, IETF (2002), http://www.ietf.org/rfc/rfc3261.txt

  5. Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications. RFC3550, IETF (2003), http://www.ietf.org/rfc/rfc3550.txt

  6. Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The Secure Real-time Transport Protocol (SRTP). RFC 3711, IETF (2004), http://www.ietf.org/rfc/rfc3711.txt

  7. Voip-Info: VoIP Gateways (2012), http://www.voip-info.org/wiki/view/VoIP+Gateways

  8. Asterisk: Codec Modules (2012), https://wiki.asterisk.org/wiki/display/AST/Codec+Modules

  9. Keromytis, A.D.: A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials 14(2), 514–537 (2012), doi:10.1109/SURV.2011.031611.00112

    Article  Google Scholar 

  10. 3GPP TS 24.147: Conferencing using the IP Multimedia (IM) Core Network (CN) subsystem; Stage 3, release 11 (2012), http://www.3gpp.org/ftp/Specs/html-info/24147.htm

  11. Grilo, A.M., Carvalho, P.M., Medeiros, L.M., Nunes, M.S.: VTOA/VoIP/ISDN telephony gateway. In: 1999 2nd International Conference on ATM, ICATM 1999, pp. 230–235 (1999), doi:10.1109/ICATM.1999.786807

    Google Scholar 

  12. Conte, A., Anquetil, L.P., Levy, T.: Experiencing Megaco protocol for controlling non-decomposable VoIP gateways. In: Proceedings of the IEEE International Conference on Networks (ICON 2000), pp. 105–111 (2000), doi:10.1109/ICON.2000.875776

    Google Scholar 

  13. Castello, F.C., Balbinot, R., Silveira, J.G., Santos, P.M.: A robust architecture for IP telephony systems interconnection. In: 2003 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM, August 28-30, vol. 2, pp. 593–596 (2003), doi:10.1109/PACRIM.2003.1235851

    Google Scholar 

  14. Yoo, H.K., Kang, B.R.: A media stream processing of VoIP media gateway. In: The 9th Asia-Pacific Conference on Communications, APCC 2003, September 21-24, vol. 1, pp. 91–94 (2003), doi:10.1109/APCC.2003.1274318

    Google Scholar 

  15. Guo, Y., Liang, M., Guo, Y., Zhang, L.: A design scheme of PSTN media gateway. In: Proceedings of the 2004 7th International Conference on Signal Processing, ICSP 2004, August 31-September 4, vol. 3, pp. 2651–2654 (2004), doi:10.1109/ICOSP.2004.1442327

    Google Scholar 

  16. Kang, T., Bae, H., Kim, D., Kim, D.: SIP/SDP signaling of media gateway with transcoding function in converged network. In: The 6th International Conference on Advanced Communication Technology, vol. 2, pp. 842–845 (2004), doi:10.1109/ICACT.2004.1292988

    Google Scholar 

  17. 3GPP TS 29.232: Media Gateway Controller (MGC) - Media Gateway (MGW) interface; Stage 3 (2012), http://www.3gpp.org/ftp/Specs/html-info/29232.htm

  18. Cisco: Voice and Unified Communications (2012), http://www.cisco.com/en/US/products/sw/voicesw/products.html

  19. Li, J.S., Tzeng, J.J., Kuo, C.M.: Building Security Gateway. In: International Conference on Information Networking, ICOIN 2009, January 21-24, pp. 1–3 (2009)

    Google Scholar 

  20. Asterisk: Secured calling tutorial (2011), https://wiki.asterisk.org/wiki/display/AST/Secure+Calling+Tutorial

  21. Skype: Privacy and Security (2012), https://support.skype.com/en/faq/FA31/does-skype-use-encryption

  22. 3GPP TS 33.203: 3G security; Access security for IP-based services (2012), http://www.3gpp.org/ftp/Specs/html-info/33203.htm

  23. Andreasen, F., Baugher, M., Wing, D.: Session Description Protocol (SDP) Security Descriptions for Media Streams, RFC 4568, IETF (2006), http://www.ietf.org/rfc/rfc4568.txt

  24. McGrew, D.: The Use of AES-192 and AES-256 in Secure RTP, RFC 6188, IETF (2011), http://www.ietf.org/rfc/rfc6188.txt

  25. 3GPP TR 33.828: IP Multimedia Subsystem (IMS) media plane security (2012), http://www.3gpp.org/ftp/Specs/html-info/33828.htm

  26. Mattsson, J., Tian, T.: MIKEY-TICKET: Ticket-Based Modes of Key Distribution in Multimedia Internet KEYing (MIKEY), RFC6043, IETF (2011), http://www.ietf.org/rfc/rfc6043.txt

  27. Cakulev, V., Sundaram, G.: MIKEY-IBAKE: Identity-Based Authenticated Key Exchange (IBAKE) Mode of Key Distribution in Multimedia Internet KEYing (MIKEY), RFC 6267, IETF (2011), http://www.ietf.org/rfc/rfc6267.txt

  28. Zimmermann, P., Johnston, A. (ed.), Callas, J.: ZRTP: Media Path Key Agreement for Unicast Secure RTP, RFC 6189, IETF (2011), http://www.ietf.org/rfc/rfc6189.txt

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, F., Clarke, N., Furnell, S. (2013). A Technology Independent Security Gateway for Real-Time Multimedia Communication. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38631-2_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38630-5

  • Online ISBN: 978-3-642-38631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics