DOI QR코드

DOI QR Code

Securing RTP Packets Using Per-Packet Key Exchange for Real-Time Multimedia

  • Jung, Younchan (School of Information, Communications and Electronics Engineering, Catholic University of Korea) ;
  • Festijo, Enrique (School of Information, Communications and Electronics Engineering, Catholic University of Korea) ;
  • Atwood, J. William (Department of Computer Science and Software Engineering, Concordia University)
  • Received : 2012.12.07
  • Accepted : 2013.01.21
  • Published : 2013.08.01

Abstract

For secure multimedia communications, existing encryption techniques use an online session key for the key exchange, for which key size is limited to less than 10 digits to accommodate the latency condition caused by user devices only being able to handle low computational loads. This condition results in poor security of recorded encrypted data. In this letter, we propose a packet key scheme that encrypts real-time packets using a different key per packet for multimedia applications. Therefore, a key of a relatively small size can provide after-transmission confidentiality to data of a real-time session.

Keywords

References

  1. F. Almasalha, N. Agarwal, and A. Khokhar, "Secure Multimedia Transmission over RTP," 10th IEEE Int. Symp. Multimedia, Dec. 2008, pp. 404-411.
  2. J. Arkko et al., "Multimedia Internet KEYing (MIKEY)," IETF, RFC 3830, Aug. 2004.
  3. R. Pecori, "A PKI-Free Key Agreement Protocol for P2P VoIP Applications," IEEE Int. Conf. Commun., June 2012, pp. 6748-6752.
  4. S. Puangpronpitag, P. Kasabai, and D. Pansa, "An Enhancement of the SDP Security Description (SDES) for Key Protection," 9th Int. Conf. Elect. Eng./Electron., Comput., Telecommun. Inf. Technol., May 2012, pp. 1-4.
  5. S. Kwok and E.Y. Lam, "Effective Uses of FPGAs for Brute-Force Attack on RC4 Ciphers," IEEE Trans. Very Large Scale Integr. Syst., Aug. 2008, vol. 16, no. 8, pp. 1096-1100. https://doi.org/10.1109/TVLSI.2008.2000670

Cited by

  1. Per-transaction Shared Key Scheme to Improve Security on Smart Payment System vol.8, pp.1, 2013, https://doi.org/10.7236/ijibc2016.8.1.7
  2. A Short Review of Security-Aware Techniques in Real-Time Embedded Systems vol.28, pp.2, 2013, https://doi.org/10.1142/s0218126619300022
  3. Packet Encryption for Securing Real-Time Mobile Cloud Applications vol.24, pp.4, 2013, https://doi.org/10.1007/s11036-019-01263-1