Efficient Key Management Protocol for Secure RTMP Video Streaming toward Trusted Quantum Network |
Pattaranantakul, Montida
(Wireless Information Security and Eco-Electronics Research Unit (WISRU), National Electronics and Computer Technology Center)
Sanguannam, Kittichai (Department of Information Technology, Triple T Broadband Public Company Limited) Sangwongngam, Paramin (Intelligent Devices and System Research Unit (IDSRU), National Electronics and Computer Technology Center) Vorakulpipat, Chalee (Wireless Information Security and Eco-Electronics Research Unit (WISRU), National Electronics and Computer Technology Center) |
1 | D. Chin, Next Generation Video Conferencing, Boosting Productivity of the Decentralized Workforce White Paper, Arkadin Global Conferencing, Los Altos: CA, USA, 2011. |
2 | F. Liu and H. Koenig, "A Survey of Video Encryption Algorithms," Comput. Security, vol. 29, no. 1, 2010, pp. 3-15. DOI |
3 | J. Shah and V. Saxena, "Video Encryption: A Survey," IJCSI, vol. 8, no. 2, Mar. 2011, pp. 525-534. |
4 | B. Kurht and D. Kirovski, "Multimedia Security Handbook," Boca Raton, FL, USA: CRC Press, 2004. |
5 | S. Frankel et al., "Guide to IPsec VPNs," Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-113, Gaithersburg, MD, USA, Dec. 2008. |
6 | J.A. Perez et al., "Quality of Service Analysis of IPSec VPNs for Voice and Video Traffic," AICT/ICIW, Guadeloupe, French Caribbean, Feb. 19-25, 2006, pp. 43-48. |
7 | S. Park et al., "Characterizing the Impacts of VPN Security Models on Streaming Video," CNSR, Montreal, Canada, May 11-14, 2010, pp. 152-159. |
8 | O. Adeyinka, "Analysis of IPSec VPNs Performance in Multimedia Environment," IET, Seattle, WA, USA, July 21-22, 2008, pp. 1-5. |
9 | Z. Li et al., "Authentication to Peer-to-Peer Network: Survey and Research Direction," NSS, Gold Coast, Australia, Oct. 19-21, 2009, pp. 115-122. |
10 | W. Fumy and P. Landrock, "Principle of Key Management," IEEE J. Sel. Areas Commun., vol. 11, no. 5, June 1993, pp. 785-793. DOI |
11 | W. Diffie and M.E. Hellman, "New Direction in Cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, Nov. 1976, pp. 644-654. DOI |
12 | W. Stallings, "Cryptography and Network Security Principles and Practices," 4th ed., New York, USA: Pearson Education, Inc., 2005. |
13 | M. Saadi et al., "Design and Implementation of Secure and Reliable Communication Using Optical Wireless Communication," Frequenz, vol. 68, no. 11-12, Nov. 2014, pp. 501-509. |
14 | W.K. Wootters and W.H. Zurek, "A Single Quantum Cannot be Cloned," Nature, vol. 299, no. 5886, Oct. 1982, pp. 802-803. DOI |
15 | M. Pattaranantakul et al., "Secure and Efficient Key Management Technique in Quantum Cryptography Network," ICUFN, Phuket, Thailand, July 4-6, 2012, pp. 280-285. |
16 | M.A. Nielsen and I.L. Chuang, "Quantum Computation and Quantum Information," 10th ed., Cambridge, UK: Cambridge University Press, Jan. 2011. |
17 | S. Wiesner, "Conjugate Coding," ACM Sigact News, vol. 15, no. 1, 1983, pp. 78-88. DOI |
18 | C.H. Bennett and G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing," IEEE Int. Conf. Comput., Syst., Signal Process., Bangalore, India, 1984, pp. 175-179. |
19 | C.H. Bennett, "Quantum Cryptography Using Any Two Non-orthogonal States," Physical Rev. Lett., vol. 68, no. 21, May 1992, pp. 3121-3124. DOI |
20 | ISO/IEC 11770-5:2011, Inf. Technol. - Security Techn. - Key Manag. - Part 5: Group Key Manag., ISO/IEC Standard, 2011. Accessed June 2, 2014. http://www.iso.org/iso/catalogue_detail.htm?csnumber=54527 |
21 | Standard Committee X9 Incorporated, ANSI, X9.24 - Retail Financial Services Systematic Key Manag. - Part 1: Using Systematic Techn., ANSI Standard, 2004. Accessed June 2, 2014. http://webstore.ansi.org/RecordDetail.aspx?sku=ANSI+X9.24-1%3A2009 |
22 | E. Barker et al., "Recommendation for Key Management - Part 1: General (Revision 3)," NIST Special Publication 800-57, Gaithersburg, MD, USA, July 2012, pp. 1-147. |
23 | E. Barker et al., "Recommendation for Key Management - Part 2: Best Practices for Key Management Organization," NIST Special Publication 800-57, Gaithersburg, MD, USA, Feb. 2014, pp. 1-78. |
24 | E. Barker et al., "Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance (Revision 1)," NIST Special Publication 800-57, Gaithersburg, MD, USA, Apr. 2014, pp. 1-94. |
25 | BBN Technologies, "DARPA Quantum Network Testbed," Air Force Research Laboratory, New York, NY, USA, Final Tech. Rep. AFRL-IF-TR-2007-180, 2007. |
26 | C. Elliott, "Building the Quantum Network," New J. Physics, vol. 4, no. 46, July 2002, pp. 46-55. DOI |
27 | M. Dianati and R. Alleaume, "Architecture of Secoqc Quantum Key Distribution Network," ICQNM, Guadeloupe, French Caribbean, Jan. 2-6, 2007, p. 13. |
28 | M. Peev et al., "The SECOQC Quantum Key Distribution Network in Vienna," New J. Physics, vol. 11, no. 7, July 2009, pp. 1-37. |
29 | O. Maurhart, Q3P A Proposal, SECOQC Project, 2006. Accessed June 2, 2014. http://www.secoqc.net |
30 | ID Quantique, Swiss Quantum Project, 2011. Accessed June 2, 2014. http://swissquantum.idquantique.com |
31 | M. Fujiwara et al., "Field Demonstration of Quantum Key Distribution in the Tokyo QKD Network," CLEO/IQEC/PACIFIC RIM, Sydney, Australia, 2011, pp. 507-509. |
32 | H. Parmar and M. Thornburgh, "Adobe's Real Time Messaging Protocol," Copyright Adobe Systems Incorporated, Dec. 2012, pp. 1-52. |
33 | M. Dianati and R. Alleaume, "Transport Layer Protocols for the SECOQC Quantum Key Distribution (QKD) Network," LCN, Dublin, Ireland, Oct. 15-18, 2007, pp. 1025-1034. |
34 | OpenMeetings, Open-Source Web-Conferencing, Apache OpenMeetings Project, 2014. Accessed June 2, 2014. http://code.google.com/p/openmeetings/ |
35 | F. Wang, Z. Xiao, and J. Chen, "Research on Security of Trusted Network and its Prospects," ETCS, Wuhan, China, Mar. 6-7, 2010, pp. 256-259. |
36 | C. Du et al., "VCNF: A Secure Video Conferencing System Based on P2P Technology," IEEE HPCC, Dalian, China, Sept. 25-27, 2008, pp. 463-469. |