LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Perkins, C.S. (2014)
Languages: English
Types: Other
Subjects:

Classified by OpenAIRE into

ACM Ref: ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
The Real-time Transport Protocol (RTP) supports a range of video conferencing, telephony, and streaming video ap- plications, but offers few native security features. We discuss the problem of securing RTP, considering the range of applications. We outline why this makes RTP a difficult protocol to secure, and describe the approach we have recently proposed in the IETF to provide security for RTP applications. This approach treats RTP as a framework with a set of extensible security building blocks, and prescribes mandatory-to-implement security at the level of different application classes, rather than at the level of the media transport protocol.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] T. Stockhammer, “Dynamic adaptive streaming over HTTP - standards and design principles,” in Proceedings of the Conference on Multimedia Systems (MMSys). San Jose, CA, USA: ACM, February 2011.
    • [2] C. Jennings, T. Hardie, and M. Westerlund, “Real-time communications for the web,” IEEE Communications Magazine, vol. 51, no. 4, pp. 20-26, April 2013.
    • [3] H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, “RTP: A transport protocol for real-time applications,” IETF, July 2003, RFC 3550.
    • [4] M. R. Macedonia and D. P. Brutzman, “MBone provides audio and video across the Internet,” IEEE Computer Magazine, vol. 27, no. 4, pp. 30-36, April 1994.
    • [5] S. McCanne and V. Jacobson, “vic: A flexible framework for packet video,” in Proc. ACM Multimedia, Nov. 1995.
    • [6] V. Hardman, M. A. Sasse, M. Handley, and A. Watson, “Reliable audio for use over the Internet,” in Proceedings of INET. Honolulu, HI, USA: Internet Society, June 1995.
    • [7] M. Handley, J. Crowcroft, C. Bormann, and J. Ott, “Very large conferences on the Internet: the Internet multimedia conferencing architecture,” in Computer Networks, vol. 31, no. 3, Feb. 1999.
    • [8] M. Westerlund and C. S. Perkins, “Options for securing RTP sessions,” IETF, April 2014, RFC 7201.
    • [9] C. S. Perkins and M. Westerlund, “Securing the RTP framework: Why RTP does not mandate a single media security solution,” IETF, April 2014, RFC 7202.
    • [10] E. Kohler, M. Handley, and S. Floyd, “Datagram congestion control protocol (DCCP),” IETF, March 2006, RFC 4340.
    • [11] R. Stewart, “Stream control transmission protocol,” IETF, September 2007, RFC 4960.
    • [12] M. F. Nowlan et al., “Fitting square pegs through round pipes: Unordered delivery wire-compatible with TCP and TLS,” in Proc. NSDI. San Jose, CA, USA: USENIX, April 2012.
    • [13] B. Carpenter and F. Baker, “IAB and IESG statement on cryptographic technology and the Internet,” IETF, August 1996, RFC 1984.
    • [14] J. Schiller, “Strong security requirements for IETF standard protocols,” IETF, August 2002, RFC 3365.
    • [15] S. Farrell and H. Tschofenig, “Pervasive monitoring is an attack,” IETF, May 2014, RFC 7258.
    • [16] H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, “RTP: A transport protocol for real-time applications,” IETF, Jan. 1996, RFC 1889.
    • [17] M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman, “The secure real-time transport protocol,” IETF, March 2004.
    • [18] J. Ott, J. Chesterfield, and E. Schooler, “RTCP extensions for SSM sessions w/unicast feedback,” IETF, Feb. 2010, RFC 5760.
    • [19] H. Schulzrinne, A. Rao, and R. Lanphier, “Real time streaming protocol (RTSP),” IETF, April 1998, RFC 2326.
    • [20] L. Gharai, C. S. Perkins, G. Goncher, and A. Mankin, “RTP payload format for Society of Motion Picture and Television Engineers (SMPTE) 292M video,” IETF, March 2003, RFC 3497.
    • [21] P. Bellows, J. Flidr, L. Gharai, C. S. Perkins, P. Chodowiec, and K. Gaj, “IPsec-protected transport of HDTV over IP,” in Proceedings of the International Conference on Field Programmable Logic and Applications, ser. Lecture Notes in Computer Science, no. 2778. Lisbon, Portgual: Springer, September 2003.
    • [22] E. Rescorla and N. Modadugu, “Datagram transport layer security version 1.2,” IETF, Jan. 2012, RFC 6347.
    • [23] T. Dierks and E. Rescorla, “The transport layer security (TLS) protocol version 1.2,” IETF, April 2008, RFC 5246.
    • [24] J. Lennox, “Connection-oriented media transport over the transport layer security (TLS) protocol in the session description protocol (SDP),” IETF, July 2006, RFC 4572.
    • [25] S. Kent and K. Seo, “Security architecture for the Internet Protocol,” IETF, December 2005, RFC 4301.
    • [26] Internet Streaming Media Alliance, “ISMA encryption and authentication, version 2.0,” November 2007.
    • [27] J. Fischl, H. Tschofenig, and E. Rescorla, “Framework for establishing a SRTP security context using DTLS,” IETF, May 2010, RFC 5763.
    • [28] D. McGrew and E. Rescorla, “DTLS extension to establish keys for SRTP,” IETF, May 2010, RFC 5764.
    • [29] E. Rescorla, “WebRTC security architecture,” IETF, July 2014, work in progress.
    • [30] J. Arkko, E. Carrara, F. Lindholm, M. Naslund, and K. Norrman, “Multimedia internet keying,” IETF, August 2004, RFC 3830.
    • [31] F. Andreasen, M. Baugher, and D. Wing, “SDP security descriptions for media streams,” IETF, July 2006, RFC 4568.
    • [32] P. Zimmerman, A. Johnston, and J. Callas, “ZRTP: Media path key agreement for unicast secure RTP,” IETF, April 2011, RFC 6189.
    • [33] H. Alvestrand, “Overview: Real time protocols for browser-based applications,” IETF, July 2014, work in progress.
    • [34] J. Ott, S. Wenger, N. Sato, C. Burmeister, and J. Rey, “RTP profile for RTCP-based feedback,” IETF, July 2006, RFC 4585.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article