Advertisement

A Technology Independent Security Gateway for Real-Time Multimedia Communication

  • Fudong Li
  • Nathan Clarke
  • Steven Furnell
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)

Abstract

With currently more than 178 million users worldwide, the demand on real-time multimedia communication services (e.g. VoIP, video conference) grows steadily. However, whilst the protocols utilised in such communications are standardised, internal aspects are not. For example, if calling parties utilise incompatible media codecs or security mechanisms, a real-time multimedia communication cannot be established. The latter would result in either a failure to establish a connection or a plaintext connection that leaves the communication open to attacks. This paper proposes a novel technology independent security gateway for real-time multimedia communications which offers ciphering assistance for these terminals when they have incompatible security mechanisms and/or media codecs, allowing them to communicate in a seamless and secure manner despite their incompatibilities. The proposed security gateway operates across standard IP protocols and provides a flexible, scalable and robust system that is capable of managing the ciphering requirements of a modern communications system.

Keywords

IMS security gateway SIP cross-ciphering 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aiache, H., Knopp, R., Koufos, K., Salovuori, H., Simon, P.: Increasing Public Safety Communications Interoperability: The CHORIST Broadband and Wideband Rapidly Deployable Systems. In: IEEE International Conference on Communications Workshops, ICC Workshops 2009, June 14-18, pp. 1–6 (2009), doi:10.1109/ICCW.2009.5208003Google Scholar
  2. 2.
    Infonetics Research: VoIP services market growing strong as businesses seek flexibility, easier management (2012), http://www.infonetics.com/pr/2012/VoIP-UC-Services-Market-Forecast-and-SIP-Trunking-Survey-Highlights.asp
  3. 3.
    Myvoiprovider: Top 100 VoIP Provider World Ranking (2012), http://www.myvoipprovider.com/en/Top_100_VoIP_Providers
  4. 4.
    Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC3261, IETF (2002), http://www.ietf.org/rfc/rfc3261.txt
  5. 5.
    Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications. RFC3550, IETF (2003), http://www.ietf.org/rfc/rfc3550.txt
  6. 6.
    Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The Secure Real-time Transport Protocol (SRTP). RFC 3711, IETF (2004), http://www.ietf.org/rfc/rfc3711.txt
  7. 7.
    Voip-Info: VoIP Gateways (2012), http://www.voip-info.org/wiki/view/VoIP+Gateways
  8. 8.
  9. 9.
    Keromytis, A.D.: A Comprehensive Survey of Voice over IP Security Research. IEEE Communications Surveys & Tutorials 14(2), 514–537 (2012), doi:10.1109/SURV.2011.031611.00112CrossRefGoogle Scholar
  10. 10.
    3GPP TS 24.147: Conferencing using the IP Multimedia (IM) Core Network (CN) subsystem; Stage 3, release 11 (2012), http://www.3gpp.org/ftp/Specs/html-info/24147.htm
  11. 11.
    Grilo, A.M., Carvalho, P.M., Medeiros, L.M., Nunes, M.S.: VTOA/VoIP/ISDN telephony gateway. In: 1999 2nd International Conference on ATM, ICATM 1999, pp. 230–235 (1999), doi:10.1109/ICATM.1999.786807Google Scholar
  12. 12.
    Conte, A., Anquetil, L.P., Levy, T.: Experiencing Megaco protocol for controlling non-decomposable VoIP gateways. In: Proceedings of the IEEE International Conference on Networks (ICON 2000), pp. 105–111 (2000), doi:10.1109/ICON.2000.875776Google Scholar
  13. 13.
    Castello, F.C., Balbinot, R., Silveira, J.G., Santos, P.M.: A robust architecture for IP telephony systems interconnection. In: 2003 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM, August 28-30, vol. 2, pp. 593–596 (2003), doi:10.1109/PACRIM.2003.1235851Google Scholar
  14. 14.
    Yoo, H.K., Kang, B.R.: A media stream processing of VoIP media gateway. In: The 9th Asia-Pacific Conference on Communications, APCC 2003, September 21-24, vol. 1, pp. 91–94 (2003), doi:10.1109/APCC.2003.1274318Google Scholar
  15. 15.
    Guo, Y., Liang, M., Guo, Y., Zhang, L.: A design scheme of PSTN media gateway. In: Proceedings of the 2004 7th International Conference on Signal Processing, ICSP 2004, August 31-September 4, vol. 3, pp. 2651–2654 (2004), doi:10.1109/ICOSP.2004.1442327Google Scholar
  16. 16.
    Kang, T., Bae, H., Kim, D., Kim, D.: SIP/SDP signaling of media gateway with transcoding function in converged network. In: The 6th International Conference on Advanced Communication Technology, vol. 2, pp. 842–845 (2004), doi:10.1109/ICACT.2004.1292988Google Scholar
  17. 17.
    3GPP TS 29.232: Media Gateway Controller (MGC) - Media Gateway (MGW) interface; Stage 3 (2012), http://www.3gpp.org/ftp/Specs/html-info/29232.htm
  18. 18.
    Cisco: Voice and Unified Communications (2012), http://www.cisco.com/en/US/products/sw/voicesw/products.html
  19. 19.
    Li, J.S., Tzeng, J.J., Kuo, C.M.: Building Security Gateway. In: International Conference on Information Networking, ICOIN 2009, January 21-24, pp. 1–3 (2009)Google Scholar
  20. 20.
    Asterisk: Secured calling tutorial (2011), https://wiki.asterisk.org/wiki/display/AST/Secure+Calling+Tutorial
  21. 21.
  22. 22.
    3GPP TS 33.203: 3G security; Access security for IP-based services (2012), http://www.3gpp.org/ftp/Specs/html-info/33203.htm
  23. 23.
    Andreasen, F., Baugher, M., Wing, D.: Session Description Protocol (SDP) Security Descriptions for Media Streams, RFC 4568, IETF (2006), http://www.ietf.org/rfc/rfc4568.txt
  24. 24.
    McGrew, D.: The Use of AES-192 and AES-256 in Secure RTP, RFC 6188, IETF (2011), http://www.ietf.org/rfc/rfc6188.txt
  25. 25.
    3GPP TR 33.828: IP Multimedia Subsystem (IMS) media plane security (2012), http://www.3gpp.org/ftp/Specs/html-info/33828.htm
  26. 26.
    Mattsson, J., Tian, T.: MIKEY-TICKET: Ticket-Based Modes of Key Distribution in Multimedia Internet KEYing (MIKEY), RFC6043, IETF (2011), http://www.ietf.org/rfc/rfc6043.txt
  27. 27.
    Cakulev, V., Sundaram, G.: MIKEY-IBAKE: Identity-Based Authenticated Key Exchange (IBAKE) Mode of Key Distribution in Multimedia Internet KEYing (MIKEY), RFC 6267, IETF (2011), http://www.ietf.org/rfc/rfc6267.txt
  28. 28.
    Zimmermann, P., Johnston, A. (ed.), Callas, J.: ZRTP: Media Path Key Agreement for Unicast Secure RTP, RFC 6189, IETF (2011), http://www.ietf.org/rfc/rfc6189.txt

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Fudong Li
    • 1
  • Nathan Clarke
    • 1
    • 2
  • Steven Furnell
    • 1
    • 2
  1. 1.Centre for Security, Communications and Network Research (CSCAN), School of Computing & MathematicsPlymouth UniversityPlymouthUnited Kingdom
  2. 2.School of Computer and Information ScienceEdith Cowan UniversityPerthWestern Australia

Personalised recommendations