Table 2: Average PESQ-LQ.
GSM G.711 µ-law
no SRTP 3.693 4.028
SRTP
3.690 4.013
an information loss.
Summing up, the introduction of the SRTP frame-
work does not seem to influence speech quality from
a practical prospective in our prototype testbed. Then,
SRTP seems suitable for a deployment in real-world
network scenario.
6 CONCLUSIONS
The introduction of real-time cryptography technique
for the multimedia flows with the adoption of the
SRTP protocol is aimed to guarantee a good security
level to multimedia communications.
One of the mechanism that offer a good level of
robustness against the two time pad typologies of at-
tacks is the introduction of a periodic key update
mechanism. In our proposal the update mechanism
towards IMS SIP signalling does not introduce any
increase of the number of exchanged messages, as
it may happen adopting a Master Key Identifier or a
(From,To) mechanism.
The quality of the communication does not turn
out to be degraded even though a real-time cryptogra-
phy and de-cryptography is performed. In particular,
the SRTP framework does not influence the quality
of the speech during VoIP communications, both in
terms of delay and PESQ-LQ index.
Future developments will concern, first of all, the
practical establishment of an SRTP session also for
the video content between two users within the IMS-
like prototype. Another development will be related
to the adaptation of our architectural solution to a
multi-conferencing scenario.
REFERENCES
3GPP, The 3rd Generation Partnership Project (1998).
http://www.3gpp.org/.
AKA (2003). Authentication and key agreement. 3GPP TS
33.102 version 6.0.0.
Arkko, J. et al. (2004). MIKEY: Multime-
dia internet keying. IETF RFC 3830,
http://www.ietf.org/rfc/rfc3830.txt.
Arkko, J. et al. (2006). Key management extension
for session description protocol (SDP) and real
time streaming protocol (RTSP). IETF RFC 4567,
http://www.ietf.org/rfc/rfc4567.txt.
Baugher, M. et al. (2004). The secure real-time
transport protocol (SRTP). IETF RFC 3711,
http://www.ietf.org/rfc/rfc3711.txt.
Beerends, J., Hekstra, A. P., Rix, A. W., and Hollier,
M. P. (2002). Perceptual evaluation of speech quality
(PESQ), the new ITU standard for end-to-end speech
quality assesment, part i & ii. 50(10):755–778.
Bellamy, J. (2000). Digital Telephony. Wiley-Interscience,
3rd edition.
Blom, R., Carrara, E., Lindholm, F., Norman, K., and
Naslund, M. (2002). Conversational IP multimedia
security. In Proc. 4th IEEE MWCN 2002, pages 147–
151.
Dierks, T. and Allen, C. (1999). The TLS protocol. IETF
RFC 2246, http://www.ietf.org/rfc/rfc2246.txt.
Franks, J. et al. (1999). HTTP authentication: Basic
and digest access authentication. IETF RFC 2617,
http://www.ietf.org/rfc/rfc2617.txt.
Handley, M. and Jacobson, V. (1998). SDP: Ses-
sion description protocol. IETF RFC 2327,
http://www.ietf.org/rfc/rfc2327.txt.
Jiang, W., Koguchi, K., and Schulzrinne, H. (2003). QoS
evaluation of VoIP end-points. In Proc. IEEE ICC
2003, volume 3, pages 1917–1921.
Koien, G. M. (2002). An evolved UMTS network domain
security architecture. Technical report, R&D Telenor.
Ranganathan, M. K. and Kilmartin, L. (2001). In-
vestigations into the impact of key exchange
mechanisms for security protocols in VoIP net-
works. In Proc. First Joint IEI/IEE Sympo-
sium on Telecommunications Systems Research.
http://telecoms.eeng.dcu.ie/symposium/papers/D2.pdf.
Robust Audio Tool (RAT) (2004). http://www-
mice.cs.ucl.ac.uk/multimedia/software/rat/.
Rosenberg, J. D. et al. (2002). Session Ini-
tiation Protocol (SIP). IETF RFC 3261,
http://www.ietf.org/rfc/rfc3261.txt.
Schaad, J. and Housley, R. (2002). Advanced encryption
standard (AES) key wrap algorithm. IETF RFC 3394,
http://www.ietf.org/rfc/rfc3394.txt.
Schulzrinne, H. et al. (2003). RTP: A transport pro-
tocol for real-time applications. IETF RFC 3550,
http://www.ietf.org/rfc/rfc3550.txt.
Senatore, A., Fresa, A., Robustelli, A. L., and Longo, M.
(2004). A security architecture for access to the IP
multimedia subsystem in B3G networks. In Proc. 7th
WPMC 2004.
Stallings, W. (2004). Data and Computer Communications.
Prentice Hall, 7th edition.
Thayer, M. et al. (1998). IP security document roadmap.
IETF RFC 2411, http://www.ietf.org/rfc/rfc2411.txt.
Vaidya, B., Kim, J., Pyun, J., Park, J., and Han, S. (2005).
Performance analysis of audio streaming in secure
wireless access network. In Proc. 4th IEEE ACIS
2005, pages 556–561.
SECRYPT 2007 - International Conference on Security and Cryptography
132