Browse > Article
http://dx.doi.org/10.9708/jksci.2010.15.12.085

Video Conferencing Authentication : A Key Management Protocol Design for safety  

Deug, Jung-Young (한세대학교 정보통신학부)
Abstract
There is an authentication method for participants with an encrypted ID and password as a symmetric-key in multilateral video conferencing. It is hard to manage when the security-keys makes many while the transportation processing for the encryption and decryption get complicated when the video conferencing involves a number of participants and the third party as an attackers to gain unauthorized symmetric-key to access video conference which makes a problem less secrecy. This study suggests three ways to enhance security in video conference: first, we present PKI-based X.509 certificate for authenticating the participants of multilateral conferencing and we suggest to encode and decode the video conference media data using a secrecy key created by each of the conference participants; second, a more secured multilateral video conferencing can be expected in a group communication by using the participants secrecy key in creating and distributing group keys, where the group key will be renewed whenever there is change in the group member; and finally, we suggest to encode the RTP payload of the media data before transmission.
Keywords
H.323.; RTP; PKI;
Citations & Related Records
연도 인용수 순위
  • Reference
1 O.Rodeh, K.P.Birman, and D.Dolev, "Optimized Group Rekey for Group Communication Systems", Network and Distributed Systems Security, 2000.
2 Yong-Deug Jung, Dae-Woo Park, and Moon-Seog Jun, "The Analysis of New Video Conference System for Secure Communications", GESTS International Trans-action on Computer Science and Engineering Volume 2, Number 1, March 2005.
3 Giuseppe Ateniese, Michael Steiner, and Gene Tsudik, "New Multiparty Authentication Services and Key Agreement Protocols". IEEE Journal on selected areas in communication, Vol. 18,No.4, April 2000.
4 R. Rivest, A Description of the RC2(r), "Encryption Algorithm", IETF RFC 2268, 1998.
5 Radha Poovendran and John S.Baras, "An Information Theoretic Approach for Design and Analysis of Rooted Tree Based Multicast key Management Schemes", IEEE Transaction on Information Theory, Vol.47, No.7, November 2001.
6 Richard J,Spillman, "Classical and Contemporary Cryptology", Pearson PrenticeHall, 2005.
7 L.Lo Iacono and C.Ruland, "Confidential Multimedia Communication in IP Networks", Proceedings of 8th IEEE International Conference on communication Systems, Singapore, 2002.
8 M. Baugher, D.McGrew, D.Oran, R. Blom, E.Carrara, M,Naslund, and K.Norrman, "The Secure Real-time Transport Protocol", IETF RFC 3711, 2004.
9 William stallings, "Cryptography and Network security", Prentice Hall, 1998.
10 Sandra Rafaeli and David Hutchison, "A Survey of Key Management for Secure Group Commu nication" ACM Computing Surveys, Vol. 35, No.3, September 2003, pp.309-329.   DOI   ScienceOn
11 E. Rescorla, "Diffie-Hellman Key Agreement Method", IETF RFC 2631, 1999.
12 M.Handley, H.Schulzrinne, E.Schooler, and J.Rosenberg, "SIP : Session Initiation Protocol", IETF RFC 3261, 2002.
13 L. Berc, W. Fenner, R. Frederick, and S. McCanne, "RTP Payload Format for JPEG-compressed Video," RFC 2035, October, 1996.
14 ITU-T Online site http:/ /www.itu.int/ rec/ recomm-endation.asp?type=folders &lang=e&parent=T-REC -H.323