A 3G IMS-BASED TESTBED FOR SECURE REAL-TIME AUDIO SESSIONS

Paolo Cennamo, Antonio Fresa, Anton Luca Robustelli, Francesco Toro, Maurizio Longo, Fabio Postiglione

2007

Abstract

The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going to be suffered by mobile users in the years to come. While a great deal of research activity, together with standardisation efforts and experimentations, is carried out on mechanisms for signalling protection, very few integrated frameworks for real-time multimedia data protection have been proposed in a context of IP Multimedia Subsystem, and even fewer experimental results based on testbeds are available. In this paper, after a general overview of the security issues arising in an advanced IP Multimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic context transfer, and allowing the setup of Secure Real-Time Protocol sessions is presented; finally, experimental results are provided together with quantitative assessments and comparisons of system performances for audio sessions with and without the adoption of the Secure Real-Time Protocol framework.

References

  1. 3GPP, The 3rd Generation Partnership Project (1998). http://www.3gpp.org/.
  2. AKA (2003). Authentication and key agreement. 3GPP TS 33.102 version 6.0.0.
  3. Arkko, J. et al. (2004). MIKEY: dia internet keying. IETF RFC http://www.ietf.org/rfc/rfc3830.txt.
  4. time streaming protocol (RTSP). IETF RFC 4567, http://www.ietf.org/rfc/rfc4567.txt.
  5. Baugher, M. et al. (2004). The secure real-time transport protocol (SRTP). IETF RFC 3711, http://www.ietf.org/rfc/rfc3711.txt.
  6. Beerends, J., Hekstra, A. P., Rix, A. W., and Hollier, M. P. (2002). Perceptual evaluation of speech quality (PESQ), the new ITU standard for end-to-end speech quality assesment, part i & ii. 50(10):755-778.
  7. Bellamy, J. (2000). Digital Telephony. Wiley-Interscience, 3rd edition.
  8. Blom, R., Carrara, E., Lindholm, F., Norman, K., and Naslund, M. (2002). Conversational IP multimedia security. In Proc. 4th IEEE MWCN 2002, pages 147- 151.
  9. Dierks, T. and Allen, C. (1999). The TLS protocol. IETF RFC 2246, http://www.ietf.org/rfc/rfc2246.txt.
  10. Franks, J. et al. (1999). HTTP authentication: Basic and digest access authentication. IETF RFC 2617, http://www.ietf.org/rfc/rfc2617.txt.
  11. Handley, M. and Jacobson, V. (1998). SDP: Session description protocol. IETF RFC 2327, http://www.ietf.org/rfc/rfc2327.txt.
  12. Jiang, W., Koguchi, K., and Schulzrinne, H. (2003). QoS evaluation of VoIP end-points. In Proc. IEEE ICC 2003, volume 3, pages 1917-1921.
  13. Koien, G. M. (2002). An evolved UMTS network domain security architecture. Technical report, R&D Telenor.
  14. Ranganathan, M. K. and Kilmartin, L. (2001). Investigations into the impact of key exchange mechanisms for security protocols in VoIP networks. In Proc. First Joint IEI/IEE Symposium on Telecommunications Systems Research. http://telecoms.eeng.dcu.ie/symposium/papers/D2.pdf.
  15. Robust Audio Tool (RAT) (2004). http://wwwmice.cs.ucl.ac.uk/multimedia/software/rat/.
  16. Rosenberg, J. D. et al. (2002). tiation Protocol (SIP). IETF http://www.ietf.org/rfc/rfc3261.txt.
  17. Session IniRFC 3261,
  18. Schaad, J. and Housley, R. (2002). Advanced encryption standard (AES) key wrap algorithm. IETF RFC 3394, http://www.ietf.org/rfc/rfc3394.txt.
  19. Schulzrinne, H. et al. (2003). RTP: A transport protocol for real-time applications. IETF RFC 3550, http://www.ietf.org/rfc/rfc3550.txt.
  20. Senatore, A., Fresa, A., Robustelli, A. L., and Longo, M. (2004). A security architecture for access to the IP multimedia subsystem in B3G networks. In Proc. 7th WPMC 2004.
  21. Stallings, W. (2004). Data and Computer Communications. Prentice Hall, 7th edition.
  22. Thayer, M. et al. (1998). IP security document roadmap. IETF RFC 2411, http://www.ietf.org/rfc/rfc2411.txt.
  23. Vaidya, B., Kim, J., Pyun, J., Park, J., and Han, S. (2005). Performance analysis of audio streaming in secure wireless access network. In Proc. 4th IEEE ACIS 2005, pages 556-561.
Download


Paper Citation


in Harvard Style

Cennamo P., Fresa A., Luca Robustelli A., Toro F., Longo M. and Postiglione F. (2007). A 3G IMS-BASED TESTBED FOR SECURE REAL-TIME AUDIO SESSIONS . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 125-132. DOI: 10.5220/0002118601250132


in Bibtex Style

@conference{secrypt07,
author={Paolo Cennamo and Antonio Fresa and Anton Luca Robustelli and Francesco Toro and Maurizio Longo and Fabio Postiglione},
title={A 3G IMS-BASED TESTBED FOR SECURE REAL-TIME AUDIO SESSIONS},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={125-132},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002118601250132},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - A 3G IMS-BASED TESTBED FOR SECURE REAL-TIME AUDIO SESSIONS
SN - 978-989-8111-12-8
AU - Cennamo P.
AU - Fresa A.
AU - Luca Robustelli A.
AU - Toro F.
AU - Longo M.
AU - Postiglione F.
PY - 2007
SP - 125
EP - 132
DO - 10.5220/0002118601250132