Securing Multimedia Applications over B-ISDN Jordi Forné, J. L. Melús, David Rebollo Department of Applied Mathematics and Telematics UNIVERSITAT POLITECNICA DE CATALUNYA Gran Capitan s/n. Módul C3. Campus Nord. Barcelona (SPAIN) Voice: +3434016011; Fax: +3434015981 email: [email protected] Abstract The Broadband Integrated Services Digital Network (B-ISDN) is expected to be the public communications network of the future. One of the prime factors influencing the development of such a network is the emergence of a large number of teleservices with different requirements (sometimes still unknown). However, a common requirement for all these services is the need to be protected against unauthorised use, which can be achieved through a suitable security system. Although specific security mechanisms can be developed for each application and service on the network, we consider that an integrated solution providing security services for all types of multimedia applications is more efficient. In this paper we present an integrated security system which can be used by every kind of multimedia application to ask for specific security services and levels of security. We also present the procedure by means of which sensitive applications negotiate security mechanisms with the distributed security system. Sensitive applications can specify a considerable number of parameters in order to define the key management as well as the following secure communication. This procedure is carried out by using a set of primitive functions. Keywords B-ISDN, multimedia applications, network security, security services

1

INTRODUCTION

In recent years, technological advances in the areas of VLSI, packet switching technology and fiber optic communications have made possible the development of a high speed integrated services network which can carry all fundamental media streams: data, voice and video. Such a network has been named B-ISDN

(Broadband Integrated Services Digital Network), and the Asynchronous Transfer Mode (ATM) has been adopted by the CCITT as a universal transfer mode for BISDN [CCITT I.121]. This transfer mode is based on the segmentation of the information stream into fixed-length packets (called cells). These cells are transferred asynchronously according to the source demand. The ATM is essentially a connection-oriented technique. All the characteristics of the service are negotiated between the user and the network during the connection establishment period and all information is routed using a virtual circuit assigned for the complete duration of the connection. The routing information is written in the header of each cell and consists of a Virtual Path Identifier (VPI) and a Virtual Channel Identifier (VCI). The protocol architecture for B-ISDN is defined by [CCITT I.321]. Two layers of the B-ISDN protocol architecture relate to ATM functions. There is an ATM layer common to all services, which provides packet transfer capabilities, and an ATM adaptation layer (AAL), which is service-dependent. The AAL maps higher-layer information into ATM cells to be transported over B-ISDN, then collects information from ATM cells for delivery to higher layers. The use of ATM creates the need for an adaptation layer to support information transfer protocols not based on ATM. The protocol reference model makes reference to three separate planes: the user plane, the control plane and the management plane. MULTIMEDIA TERMINAL 2

MULTIMEDIA TERMINAL 1

B-ISDN

VIDEO + AUDIO

VIDEO + AUDIO

Figure 1 Scenario A: multimedia terminals directly connected to the B-ISDN. Although terminals supporting only voice or data can be connected to the BISDN, multimedia terminals are expected to be the support by means of which data, voice and video services will access the broadband network. Figure 1 shows two multimedia terminals that communicate through the ATM network. Each terminal must have a suitable interface for video and audio applications, as well as an interface for the broadband network. The scenario presented in Figure 1 will be very usual in the future B-ISDN, where a great range of services will be supported. Most of these broadband services will also require some security services, like confidentiality, integrity, authentication, access control and nonrepudiation. To implement these security

services, security mechanisms (like encryption and key management) must be used. Although we will propose a solution to secure multimedia terminals communicating through the broadband network, as presented in Scenario A, we cannot forget that an interconnection scenario such as Scenario B will be very usual, especially during the initial periods, when many users will use the network for LAN and MAN interconnection. In Figure 2 such a scenario is illustrated. We can see that multimedia terminals MT1 and MT2 directly access the broadband network, MT3 access through a Local Area Network, MT4 through a Metropolitan Area Network, and MT5 through a LAN interconnected to the BISDN via a MAN. The solution we will propose for Scenario A should coexist with the interconnected Scenario B. MT4

MT5

MAN

R

LAN 2

MT2

RELAY

MT1

B-ISDN

RELAY

LAN 1

MT3

Figure 2 Scenario B: Some terminals are directly connected to the B-ISDN, while others access it through LANs and MANs. Next, we will present the architecture of a security system that will provide security services for the multimedia applications.

2

ARCHITECTURE OF THE SECURITY SYSTEM

The following are the requirements for the security system: • The security system must provide security services only for sensitive applications • The session key used for the bulk of the information must depend on the application • The encryption mechanism must provide fast encryption for the bulk of the information • Data compression must be performed before encryption and encryption must be performed before channel coding • The security system must be an integrated solution which can provide security services for all types of multimedia services and applications • The security system must permit compatibility with network interconnection and environments such as Scenario B • End-to-end security mechanisms must be used The above requirements as well as the logical placement of the security services within the ATM Protocol Reference Model are justified in [FOR96]. With the above considerations, in Figure 3 we propose the security system's architecture. We only use the user plane of the B-ISDN Protocol Reference Model (see CCITT I.321, 1991). This means that we do not interfere with the network control and management for the sake of simplicity. We are aware that the use of the control and management plane would permit the integration of the security management in the network signalling, with several advantages (e. g., the security services could be negotiated as QoS parameters during the connection establishment period, and security services could be provided for the network management). However, this would need a redefinition of network signalling and management, which is beyond the scope of this work. We consider the security services defined by [ISO 7498-2], which are: authentication, access control, confidentiality, integrity and non repudiation. The security protocol is composed of two layers: the Secure ATM Adaptation Layer (SEC-AAL) and the Secure Application Layer (SEC-APL). At the lowest level, the SEC-AAL is layered on top of the ATM Adaptation Layer, and it is application protocol independent. A higher level protocol can layer on top of the SEC-AAL transparently. It provides the mechanisms for bulk encryption and the services of confidentiality and integrity. [FOR96] shows why this is the best placement of these security services. The SEC-APL is placed at the application layer. The asymmetric encryption mechanism, as well as the key-management and the services of access control, nonrepudiation and authentication, are placed at this layer, as justified in [FOR96]. The sensitive applications can require the security services they need

through a suitable application interface (API), which must specify security primitives to be used by applications.

Access Control Nonrepudiation Authentication Key-Management

ASYMMETRIC CIPHER

SECURITY MANAGEMENT

SENSITIVE APPLICATIONS

API

SECURE APPLICATION LAYER (SEC-APL)

HIGHER-LAYER PROTOCOLS

TCP

... CONFIDENTIALITY

HIGHER-LAYER PROTOCOLS

BULK CIPHER

INTEGRITY

SECURE AAL

NON-SENSITIVE APPLICATIONS

IP (SEC-AAL) ATM ADAPTATION LAYER

ATM LAYER

PHYSICAL LAYER

SECURITY SYSTEM

Figure 3 Architecture of the security system. To illustrate how the security system works, let us to show a simplified example, where we do not consider the negotiation of security parameters. Suppose that a sensitive application on a local multimedia terminal (represented on the left side of Figure 3) requires a confidential connection with a remote application running on a remote terminal. The following steps, shown in Figure 4, must be carried out: 1.-The application (AP) demands the confidentiality service to the secure management module (SMM) through the Application Interface (API) by means of a well defined primitive function (see Section 5). 2.-The SMM wakes up the Key Management Module (KMM) in order to negotiate a Session Key (SK) to be sent to the bulk cipher. 3.-The KMM negotiates an SK with the remote entity according to an authenticated key-management protocol, which makes use of the Asymmetric

Cipher (AC). This protocol uses a reliable communications protocol (e. g., TCP/IP). When this protocol is finished, both the local and the remote KMMs have agreed on a SK to be used for both Bulk Ciphers (BCs) to encrypt the connection. 4.-This SK and its Application Identifier (AI) are sent to the confidentiality module (CM) at the SEC-AAL and the SK is loaded in the BC. 5.-The AP is acknowledged that the CM of the SEC-AAL layer is ready to provide the required service. 6.- The AP begins the confidential connection by sending the information to the communication protocol stack. When this information reaches the SEC-AAL layer, its AI makes the CM send it to the bulk cipher to be encrypted with the suitable key (each AI has its associated SK). 7.-Then the encrypted information is sent to the network through the ATM Adaptation Layer. SECURE APPLICATION LAYER (SEC-APL)

(5)

AC API

SENSITIVE APPLICATION (AP)

(2)

SMM

(1)

(3) KMM

(4) (3) (4)

(6)

TCP

... CONFIDENTIALITY

SECURE AAL

BULK CIPHER (BC)

(SEC-AAL)

IP

(7)

ATM ADAPTATION LAYER

ATM LAYER

PHYSICAL LAYER

Figure 4 An example of the steps to establish a confidential connection. At the remote terminal a similar process is done and the information is decrypted with the same SK. When the confidential connection is finished, the Secure Management Module is acknowledged by the Application and it resets the Bulk Cipher. For non-sensitive applications the security system is transparent.

3

COMPATIBILITY WITH SCENARIO B

In this section we study whether the proposed security system can fulfil the following requirement: "The security system must permit compatibility with network interconnection and environments such as Scenario B". When two different systems can communicate with each other it is because they share a common protocol. In B-ISDN this protocol is specified by the B-ISDN Protocol Reference Model (CCITT I.321). Systems connected to other types of networks will share another protocol specification to communicate within their network. Interconnection of different networks is possible because systems can communicate through a shared family of protocols placed at higher layers. One example of these higher layer protocols is the TCP/IP family, which is used by Internet to build the widest computer interconnection scenario ever seen. In such a network each host is associated with an IP address, which is used to route the information through a virtual network, called Internet, without restrictions due to the physical network where the host is connected to. Without loss of generality, we can study the compatibility of the security system proposed in Section 2 with scenarios like Scenario B (Figure 2, Section 1), assuming that the end systems share the TCP/IP protocol suite (i. e., they are connected to Internet). As an example, we come back to Figure 2 and we assume that MT1 and MT3 are connected to Internet (i. e., they both use TCP/IP) and, for instance, MT1 opens a connection (e. g., telnet) with MT3. To provide confidentiality or integrity, requirement 7 leads us to place bulk encryption at the top of the IP layer (the IP header cannot be encrypted to permit information routing). Mutual fulfilment of requirements 4 and 5 would place bulk encryption on top of a reliable protocol (e. g., TCP). Anyway, MT3 can never use the security system proposed in Section 2, because it is not directly connected to the B-ISDN and therefore cannot access the SEC-AAL layer. The information must therefore be encrypted at any level from the IP layer to the application layer, with a specific Internet security protocol. The requirement of compatibility means that the proposed security system must permit other security protocols provided at higher layers. This is easily achieved because we provide security services depending on the application requirements. If applications are secured at any higher layer, then security services are not required to the secure management module of the SEC-APL layer, and the SECAAL layer considers this application as a non-sensitive application. The other compatibility requirement is to allow secure interconnection of LANs and MANs through B-ISDN. This can be achieved if the SEC-APL and SECAAL are offered by the relays that interconnect the other networks with B-ISDN. [REC93] gives an example of how relay devices can be used to provide security services to interconnect secure networks through an insecure network.

4

NEGOTIATION OF SECURITY SERVICES

As mentioned above, a sensitive application initiates a secure communication request by sending a primitive to the SEC-APL layer of the local multimedia terminal. This primitive must specify, among others, the following parameters : • Security service : confidentiality, integrity, authentication, access control, nonrepudiation or a combination of them. • Level of security : For non expert users it can be specified as a generic level (p. e., a number between 1 and 5). A lower level means less security, while higher levels typically require more computation power or provide less bandwidth. The SEC-APL transforms a level of security into and algorithm and a key length, if they are not specified by the user. • Algorithm : Expert users/applications can specify the actual algorithm to be used. Non expert users are not expected to specify this parameter. • Length of the key : Expert users/applications can also specify the length of the key, if it is not implicit by the algorithm. Non expert users will not specify this parameter. • Speed : Some levels of security (or some algorithms and key lengths) cannot be provided at high speed. Therefore, speed must be specified to detect incompatibilities. • Probability of error : For instance, if a block encryptor is used, a simple bit error during transmission would result in a whole block error after decryption. • Delay : Information processing, necessary to provide the security services, will introduce a delay in the communication. It must be verified if the delay specified by the user can be achieved with the level of security. • Environment : This parameter specifies things such as the version of keymanagement protocol to be used, the Certification Authorities/Centres to be trust, etc. • Service-dependent parameters : The above parameter are generic for all security services. There are others specific of each service. For instance, type of authentication (one-way, two-way or three) and hash function used for the authentication service, type of nonrepudiation (origin or deliver) and format of the digital signature for the nonrepudiation service, etc. Figure 5 shows the operating flowchart of the security system. When the SECAPL receives a primitive, it must check if the set of requirements can be provided. Otherwise, it must propose a new set of parameters to the application. For instance, if the user demands a specific algorithm and this algorithm is not available or other parameters such as speed or delay cannot be fulfilled, the SECAPL proposes another algorithm with the same generic level of security, if possible.

APL A⇒SEC-APL A: SEC-ASSOCIATE request. Specification of the security service parameters. If SEC-APL A proposes a specification, it may be accepted by APL A. Does SEC-APL A accept the specification?

N

SEC-APL A⇒APL A: L-SEC-REPORT indication. Indication that SEC-APL A does not accept the specification and suggests another.

Y SEC-APL A⇒SEC-APL B: Sec_Associate invoke. Specification of the locally negotiated parameters. Does SEC-APL B accept the specification?

N

Y SEC-APL B⇒APL B: SEC-ASSOCIATE indication. Indication that APL A requests a secure communication. Does APL B accept the secure communication?

N

Y APL B⇒SEC-APL B: SEC-ASSOCIATE response. Indication that APL B accepts the secure communication. SEC-APL B⇒SEC-APL A: Sec_Associate replay. Communication of this acceptance.

SEC-APL B⇒SEC-APL A: Sec_Associate notify. Indication that SEC-APL Bdoes not accept the specification. Information about SEC-APL B configuration. SEC-APL A⇒APL A: R-SEC-REPORT.indication. Communication of this indication. SEC-APL A suggests another specification to APL A. APL B⇒SEC-APL B: APL-SEC-REPORT.request. APL B does not accept the secure communication. SEC-APL B⇒SEC-APL A: Sec_Associate notify. Communication of this refusal. SEC-APL B⇒APL A: APL-SEC-REPORT.indication. Indication of the refusal to establish the secure communication.

KEY MANAGEMENT SEC-APL A⇒APL A: SEC_ASSOCIATE confirm. Confirmation of the secure connection establishment. SECURE COMMUNICATION

Who finishes the communication?

B

A APL A⇒SEC-APL A: SEC-RELEASE request. Request for finishing the communication. SEC-APL A⇒SEC-APL B: Sec_Release invoke. Communication of this request. SEC-APL B⇒APL B: SEC-RELEASE indication. Indication of finishing the communication. APL B⇒SEC-APL B: SEC-RELEASE response. Indication that APL B accepts the request for finishing the communication. SEC-APL B⇒SEC-APL A: Sec_Release replay. Communication of this acceptance. SEC-APL A⇒APL A: SEC-RELEASE confirm. Confirmation of the secure connection release.

Figure 5 Operating flowchart of the security system

A similar process.

If the security parameters are accepted by the local SEC-APL, the process has not still ended. The local SEC-APL must consult the remote SEC-APL to see if the requested services and parameters can be provided at the remote terminal. If this is not possible, both SEC-APL layers have to negotiate a new set of parameters, as close as possible from the user requirements. Then, the local SECAPL passes to the sensitive application the new set of parameters. If the application agrees with them, these new parameters will be used for the following secure connection. Note that it is very important that the application were informed if the requested security parameters cannot be provided by the local or by the remote SEC-APL. If the problem is local nothing can be done, and the suggested parameters should probably be accepted. If the problem resides in the remote terminal, maybe another server providing the required services could be used in a typical distributed environment. Another important issue is to indicate if the impossibility to provide a security service with a set of parameters is permanent or transitory. Maybe encryption hardware is used and this hardware can be busy, making some encryption speed unreachable at a given moment, but easy to achieve later when this hardware will be release. Another example is a busy server that cannot temporally provide some specific services. Once the security parameters have been negotiated, both SEC-APL layers must negotiate a key or a set of keys to be used by means of authenticated keymanagement protocols. These protocols have, among others, the following requirements: • Data Confidentiality: Secret keys must be kept confidential during transmission • Modification Detection: To detect unauthorised modifications during transmission • Replay Detection • Entity/Origin Authentication: The entity is the one claimed Certification Centres and other Trusted Parties can be accessed during the key negotiation period. Public key infrastructure is very helpful to implement the keymanagement protocols in large connection-oriented networks, like the B-ISDN.

5

THE APPLICATION PROGRAMMING INTERFACE

In this section we present how sensitive applications request security services from the Secure Application Layer (SEC-APL). We define an application programming interface (API) as the mechanism through which application software interacts with the security system. This API defines a set of primitive functions that are used by the applications to ask for

security services or to report some special situations. The SEC-APL layer also reports special events to the applications. To define these primitive functions, we use a terminology similar to the one used by the OSI Reference Model [ISO 7498]. Table 1 shows the primitives used to provide security services. Table 1 Services, service elements and primitives to provide security to the applications. Service Security association

Service element SEC-ASSOCIATE

Security release

SEC-RELEASE

Local SEC-APL report Remote SEC-APL report Remote application report

L-SEC-REPORT R-SEC-REPORT APL-SEC-REPORT

Primitives Request; Indication; Response, Confirm Request, Indication; Response; Confirm Indication Indication Request; Indication

The first service is the security association. A security association is a relationship, between two or more systems, with attributes which model shared rules and state information (e.g., entity identifiers, selected algorithms, keys, and parameters) maintained between two systems. A security association supports the provision of a consistent type of protection to a sequence of data transfers. We implement this association as a confirmed service element (SEC-ASSOCIATE) with four primitives (SEC-ASSOCIATE.request; SEC-ASSOCIATE.indication; SEC-ASSOCIATE.response; SEC-ASSOCIATE.confirm). The second service is the security release. This is also a confirmed service element (SEC-RELEASE) which is used to release a security association when the secure connection has finished. We define primitives to report that the requested security services and parameters cannot be provided, which are: L-SEC-REPORT.indication; R-SECREPORT.indication, APL-SEC-REPORT.request and APL-SECREPORT.indication. The local SEC-APL report (L-SEC-REPORT) uses the primitive L-SECREPORT.indication to indicate that the local SEC-APL layer cannot provide the requested security services. This function indicates if the impossibility is transitory or permanent and also suggests a new set of parameters. L-SEC-REPORT.indication( time, new_set_of_parameters )

The remote SEC-APL report (R-SEC-REPORT) uses the primitive L-SECREPORT.indication to indicate the application that the remote SEC-APL layer cannot provide the requested security services. This function indicates if the impossibility is transitory or permanent and also suggests a new set of parameters. R-SEC-REPORT.indication( time, new_set_of_parameters ) The remote application report (APL-SEC-REPORT) indicates that the remote application cannot accept this secure connection, by means of two primitives, which are called APL-SEC-REPORT.request and APL-SEC-REPORT.indication. We have presented above the interface between an application and the SECAPL layer, which is defined as a set of primitives by means of which sensitive applications ask for security services. The SEC-APL entities communicate to each other following a Security Management Protocol, which defines a set of primitives to transfer messages between two SEC-APL cooperating layers. Below we present the primitives exchanged between the local and the remote SEC-APL layers. Apart from the primitives used for key management, we define the following: • Sec_Associate invoke: Request for a security association (form the calling party). • Sec_Associate reply: Acceptance of a security association (from the called party). • Sec_Associate notify: Rejection of the security association request, proposing a new set of parameters (from called party). • Sec_Release invoke: Request of a security association release (form either the calling or the called party). • Sec_Release reply: Acknowledge of a security association release (form either the calling or the called party). These primitives define the messages exchanged between cooperating SECAPL layers to negotiate the security parameters and to release the security association. These layers make use of ordinary communication protocols to communicate through the network and to securely negotiate keying material. There is also an implicit mutual authentication during the key management.

6

EXAMPLE OF OPERATION

Figure 6 presents an example of the steps followed by a successful secure communication and the primitives involved. Firstly, the local application A asks

for a secure communication with the remote application B by sending the SECASSOCIATE request primitive with the required parameters to the co-located SEC-APL A. Supposing that SEC-APL A can offer the required security services, it sends these parameters to the remote SEC-APL B through the Sec_Associate invoke primitive. Supposing again that the SEC-APL B can provide these security services, then it sends the SEC-ASSOCIATE.indication primitive to the colocated application B to see if the application can accept this connection. If so, the application responds with the SEC-ASSOCIATE.response primitive and the SEC-APL B sends a message to the SEC-APL A through the Sec_Association reply primitive to inform that the remote terminal can accept the security association request. CO-LOCATED APPLICATION A

SEC-APL B

Sec_Associa te invoke

Sec_Associate replay

APPLICATION B

SEC-AS indicationSOCIATE SEC-ASS response

OCIATE

KEY MANAGEMENT

SEC-ASS confirm

OCIATE

ASSOCIATION RELEASE

SECURE COMMUNICATION

SEC-R request ELEASE

EASE SEC-REL confirm

Sec_Release invoke

Sec_Release replay

SEC-RE indicationLEASE EASE SEC-REL response

PARAM. NEGOTIATION

SEC-A request SSOCIATE

ASSOCIATION ESTABLISHMENT

CO-LOCATED

SEC-APL A

Figure 6 Example of the steps of a successful secure communication and primitives involved. Then, both SEC-APL layers exchange several messages for the key management protocol (which is not detailed in this paper) and when they have agreed on a session key, the SEC-APL A informs the application by sending the SEC-ASSOCIATE.confirm primitive. When the application A receives the SEC-ASSOCIATE.confirm primitive then it proceeds like an insecure application, sending the information through the communication protocols. Nevertheless, a secure communication is actually carried out because security services are provided at the SEC-AAL layer transparently. Any application can release the secure connection by sending the SECRELEASE.request primitive to its co-located SEC-APL. This process also implies the activation of the primitives SEC-RELEASE indication, SECRELEASE.response and SEC-RELEASE.confirm between the applications and the SEC-APL layers. It also implies the exchange of messages through the network by means of the Sec_Release invoke and Sec_Release reply primitives. Figures 7, 8 and 9 show examples of unsuccessful security associations and the primitives that are used to notify this situation. The simpler case, shown in Figure 7, is when the local SEC-APL layer does not accept the arguments of the SEC-ASSOCIATE.request primitive. In this case there are not messages exchanged through the network. CO-LOCATED APPLICATION A

SEC-APL A

S E C -A re q u e st S S O C IA T E EPO L -S E C -R n in d ic at io

RT

SEC-APL A does not accept the specification

Figure 7 The local SEC-APL cannot provide the required security services. Other possibility is that the remote SEC-APL layer does not accept the specification, as shown in Figure 8, or maybe the remote application does not accept the secure communication, as shown in Figure 9. In these both cases there are messages exchanged through the network and the same Sec_Associate notify primitive is used. Different parameters of this function differentiate both cases.

CO-LOCATED APPLICATION A

SEC-APL A

SEC-A request SSOCIATE

EPORT R-SEC-Rn indicatio

SEC-APL B

Sec_Associa te invoke

SEC-APL B does not accept the specification

Sec_Associate notify

Figure 8 The remote SEC-APL cannot provide the required security services.

CO-LOCATED APPLICATION A

CO-LOCATED

SEC-APL A

SEC-A request SSOCIATE

-REPOR APL-SECn indicatio

T

SEC-APL B

Sec_Ass ocia te invoke

Sec_Associate notify

APPLICATION B

SEC-A indicatioSnSOCIATE -R APL-SEC request

E P O RT

APL B does not accept the secure communication

Figure 9 The remote application does not accept the secure connection.

7

CONCLUSIONS

In this paper we have presented an integrated solution for providing security services for all applications and services that will use the future Broadband Integrated Services Digital Network (B-ISDN). We propose a security system that can not only guarantee security services for all kinds of sensitive multimedia applications, but can also be transparent for applications that make use of other security protocols, allowing secure communication with terminals belonging to different LANs and MANs interconnected to B-ISDN. The security system is composed of two layers. At the lowest level, the SECAAL is layered on top of the ATM Adaptation Layer, and it is application protocol independent. A higher level protocol can layer on top of the SEC-AAL

transparently. It provides the mechanisms for bulk encryption and the services of confidentiality and integrity. The SEC-APL is placed at the application layer and provides the keymanagement, access control, non repudiation and authentication. It is used by applications to require security services with some specified parameters, through an application programming interface (API). This API defines a set of security primitives, which are used to negotiate security services between applications and the SEC-APL layer. In a point to point communication the local and the remote SEC-APL layers must exchange messages to negotiate the security parameters, especially the keying material which must be carefully negotiated by means of an authenticated key-management protocol. In [FOR95] we propose a key negotiation protocol suitable for this environment, although other protocols, like the STS protocol proposed by Diffie et al. [DIF92], can be used. The generalisation of the security negotiation for multipoint communications with the proposal of multiparty key negotiation protocols is an open field. The philosophy of this design and the interface between applications and the SEC-APL layer can be exported to other kinds of networks. In this way we are currently working in developing a similar security system for the Internet.

7

REFERENCES

[REC93] F. Recacha, J. L. Melús, M. Soriano, X. Simón, J. Forné, Secure Communications in Extended Ethernet Environments. IEEE Journal on Selected Areas in Communications. Volume 11. Number 5. 1995. [CCITT I.121]CCITT Recommendation I.121. (1991) Broadband Aspects of ISDN. [CCITT I.321]CCITT Recommendation I.321. (1991) B-ISDN Protocol Reference Model and its Applications. [DIF92] W. Diffie, P. C. van Oorschot, M. J. Wiener, Authentication and Authenticated Key Exchanges. Designs, Codes and Cryptography. Kluwer Academic Publishers, The Netherlands. 1992 [FOR95] J. Forné, F. Recacha, M. Soriano, J. L. Melús "The Cripto Project Architecture: A Spanish Experience in Broadband Networks Security", Proceedings ICC'95 (IEEE International Conference on Communications). Seattle (USA), Jun. 95. [FOR96] J. Forné, J. L. Melús,. An Integrated Solution for Secure Communications over B-ISDN. Proceedings of the Communications and Multimedia Security. Joint Working Conference IFIP TC-6 and TC-11. CHAPMANN-HALL. (to appear). [ISO 7498] ISO 7498. Information Processing Systems - Open Systems Interconnection - Basic Reference Model. [ISO 7498-2] ISO 7498-2, Security Architecture

Securing Multimedia Applications over B-ISDN

Keywords. B-ISDN, multimedia applications, network security, security services ..... management protocol to be used, the Certification Authorities/Centres to be.

86KB Sizes 1 Downloads 165 Views

Recommend Documents

Securing Multimedia Applications over B-ISDN
The Broadband Integrated Services Digital Network (B-ISDN) is expected to be ... Figure 1 Scenario A: multimedia terminals directly connected to the B-ISDN.

Benchmarking the Compiler Vectorization for Multimedia Applications
efficient way to exploit the data parallelism hidden in ap- plications. ... The encoder also employs intra-frame analysis when cost effective. ... bigger set of data.

Challenging Issues in Multimedia Transmission over ...
The motivation for studying such types of ad-hoc networks can be seen in various practical situations. For example, in an emergency situation, either the existing network in the underlying area fails or the number of communication requests in the net

pdf-1441\securing-communication-of-legacy-applications-with-ipsec ...
... apps below to open or edit this item. pdf-1441\securing-communication-of-legacy-applications- ... ting-data-in-transit-without-changes-in-your-existi.pdf.

Securing marketing returns
For Defender Direct, helping people investigate their home security options is the key to earning sales. The company ... have one of the highest phone close rates in the business. A safe bet. Defender Direct ... company's advertising mix includes pri

Performance Evaluation of Safety Applications over ...
Oct 1, 2004 - mobile ad hoc networks employing the physical and MAC layers of. DSRC. ... in hot spot areas where the system gets overloaded and it may be favorable for ...... safety applications (e.g. toll collection and file transfer) is a po-.

Performance Evaluation of Safety Applications over DSRC ... - CiteSeerX
Oct 1, 2004 - vehicular ad hoc network executing vehicle collision avoidance ap- plications .... includes one control channel and six service channels. DSRC,.

Wireless IPTV over WiMAX: Challenges and Applications
... resultant transmit signal is sent to the crest factor reduction (CFR) processor, where .... provide maximum +36dBm composite transmit power level, are used to ...

Securing marketing returns
Call today, install tomorrow. Defender Direct helps protect people's homes and loved ones. This nationwide dealer network can install, in 24 hours, a top-brand security system valued at. $850 – at no cost for parts and activation. Customers pay a $

Securing marketing returns
2010 Google Inc. All rights reserved. Google and the Google ... Android phones, so we set up specific campaigns targeted toward those devices,” recalls Keith ...

Multimedia Systems
Course Outline: 1. Introduction. 2. Multimedia Data ... Lab on Multimedia Programming (JMF), Adobe Flash. • Review of Articles. – Will be given by the Instructor.

Reading Multimedia DESCRIPTORS.pdf
Page 1 of 2. Close Reading of Multimedia Texts. The Elements of Multimedia Composition Descriptors. Developed by Mary Ellen Dakin with contributions from ...

Multimedia Compression Technologies
Feb 1, 2008 - Body. Standard Bit-rate. Application. ITU-T H.261. 192Kbps. ISDN-Phone. ISO. MPEG-1. 1.5Mbps. CD-ROM. ISO. MPEG-2. 4-8Mbps. SDTV ...

Reading Multimedia ORGANIZER.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Reading ...

SCALABLE MULTIMEDIA FINGERPRINTING ...
Digital fingerprinting is an emerging forensic tool to protect mul- ... and enables to offer stronger protection of multimedia. .... Other criteria give the same trend. 3.

Online Multimedia Advertising - Semantic Scholar
the creative itself; for example, hour of the day and TV .... column of Xand center and scale the remain- ing columns. Call the result X*. 3. .... onds and under two hours. ... 18-24. Female. No. No. No. 25-34. Both. Unknown. Unknown. 35-44.

Multimedia Systems: Acquisition
Eye and sight. Color-detecting equipment inside an eye is called a "cone." (The rods are for night vision.) 17 ... humans, that have poor color vision!

Multimedia and Appln.pdf
______ HTML tag is used to insert a Flash movie in a web page. 7. DAT is an acronym for ______. 8. ____________is used to store static and animated images ...