Abstract
The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going to be suffered by mobile users in the years to come. While a great deal of research activity, together with standardisation efforts and experimentations, is carried out on mechanisms for signalling protection, very few integrated frameworks for real-time multimedia data protection have been proposed in a context of IP Multimedia Subsystem, and even fewer experimental results based on testbeds are available. In this paper, after a general overview of the security issues arising in an advanced IP Multimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic context transfer, and allowing the setup of Secure Real-Time Protocol sessions is presented; finally, experimental results are provided together with quantitative assessments and comparisons of system performances for audio sessions with and without the adoption of the Secure Real-Time Protocol framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rosenberg, J.D., et al.: Session Initiation Protocol (SIP) IETF RFC 3261(2002), http://www.ietf.org/rfc/rfc3261.txt
Schulzrinne, H., et al.: RTP: A transport protocol for real-time applications, IETF RFC 3550 (2003), http://www.ietf.org/rfc/rfc3550.txt
Baugher, M., et al.: The secure real-time transport protocol (SRTP), IETF RFC 3711 (2004), http://www.ietf.org/rfc/rfc3711.txt
3GPP, The 3rd Generation Partnership Project (1998), http://www.3gpp.org/
Thayer, M., et al.: IP security document roadmap, IETF RFC 2411 (1998), http://www.ietf.org/rfc/rfc2411.txt
Dierks, T., Allen, C.: The TLS protocol, IETF RFC 2246 (1999), http://www.ietf.org/rfc/rfc2246.txt
Franks, J., et al.: HTTP authentication: Basic and digest access authentication, IETF RFC 2617 (1999), http://www.ietf.org/rfc/rfc2617.txt
Koien, G.M.: An evolved UMTS network domain security architecture. Technical report, R&D Telenor (2002)
Schaad, J., Housley, R.: Advanced encryption standard (AES) key wrap algorithm, IETF RFC 3394 (2002), http://www.ietf.org/rfc/rfc3394.txt
Stallings, W.: Data and Computer Communications, 7th edn. Prentice-Hall, Englewood Cliffs (2004)
Blom, R., Carrara, E., Lindholm, F., Norman, K., Naslund, M.: Conversational IP multimedia security. In: Proc. 4th IEEE MWCN 2002, pp. 147–151 (2002)
Ranganathan, M.K., Kilmartin, L.: Investigations into the impact of key exchange mechanisms for security protocols in VoIP networks. In: Proc. First Joint IEI/IEE Symposium on Telecommunications Systems Research (2001), http://telecoms.eeng.dcu.ie/symposium/papers/D2.pdf
Vaidya, B., Kim, J., Pyun, J., Park, J., Han, S.: Performance analysis of audio streaming in secure wireless access network. In: Proc. 4th IEEE ACIS 2005, pp. 556–561 (2005)
Arkko, J., et al.: MIKEY: Multimedia internet keying, IETF RFC 3830 (2004), http://www.ietf.org/rfc/rfc3830.txt
Arkko, J., et al.: Key management extension for session description protocol (SDP) and real time streaming protocol (RTSP), IETF RFC 4567 (2006), http://www.ietf.org/rfc/rfc4567.txt
Senatore, A., Fresa, A., Robustelli, A.L., Longo, M.: A security architecture for access to the IP multimedia subsystem in B3G networks. In: Proc. 7th WPMC 2004 (2004)
AKA: Authentication and key agreement (2003) 3GPP TS 33.102 version 6.0.0
Handley, M., Jacobson, V.: SDP: Session description protocol, IETF RFC 2327 (1998), http://www.ietf.org/rfc/rfc2327.txt
Robust Audio Tool (RAT) (2004), http://www-mice.cs.ucl.ac.uk/multimedia/software/rat/
Bellamy, J.: Digital Telephony, 3rd edn. Wiley, Chichester (2000)
Jiang, W., Koguchi, K., Schulzrinne, H.: QoS evaluation of VoIP end-points. In: Proc. IEEE ICC 2003, vol. 3, pp. 1917–1921 (2003)
Beerends, J., Hekstra, A.P., Rix, A.W., Hollier, M.P.: Perceptual evaluation of speech quality (PESQ), the new ITU standard for end-to-end speech quality assessment, part I & II. 50, 755–778 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cennamo, P., Fresa, A., Longo, M., Postiglione, F., Robustelli, A.L., Toro, F. (2008). Securing Real-Time Sessions in an IMS-Based Architecture. In: Filipe, J., Obaidat, M.S. (eds) E-business and Telecommunications. ICETE 2007. Communications in Computer and Information Science, vol 23. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88653-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-88653-2_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88652-5
Online ISBN: 978-3-540-88653-2
eBook Packages: Computer ScienceComputer Science (R0)