SlideShare ist ein Scribd-Unternehmen logo
1 von 26
ITU-T Security Workshop Session 2 –  Security in IP-based networks and services 13-14 May 2002, Seoul/Korea Multimedia Security within Study Group 16 Past, Presence and Future Pierre-André   Probst Chair ITU-T SG 16 Martin Euchner  Rapporteur Q.G/16
Outline of Presentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ITU-T Study Group 16 Question G “Security of MM Systems & Services“ Part I 
Study Group 16 - Security-related Questions in the MediaCom2004 project Q.C - MM Applications & Services  F.706 Q.D - Interoperability of MM Systems & Services Q.G - Security of MM Systems & Services  H.233, H.234, H.235 Q.1 MM Systems, Terminals & Data Conferencing H.320 H.324 T.120 Q.2 MM over Packet Networks using H.323 systems H.225.0 H.323 H.450 H.460 Q.3 Infrastructure & Interoperability for MM over Packet Network Systems H.245 H.246 H.248 Q.4 Video and Data conferencing using Internet supported Services Q.5 Mobility for MM Systems & Services H.501 H.510 H.530 Q.F - MM Quality of Service & E-2-E Performance in MM Systems 
Question G Security of MM Systems & Services   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],
Multimedia Communications Security Some questions to address ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],
Q.G Work and Study Items Some Highlights ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],
Target Multimedia Applications with Security Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],
Threats to Multimedia Communication WAN Internet Private Network Intranet Unauthorized Access to Resources and Services Intrusion Repudiation (Data, Service) Eavesdropping, Disclosure Billing Fraud Masquerade Manipulation of Data Replay Misuse of Data Misuse of Services Denial of Service Traffic Analysis Insider Threats Internet PC PDA Notebook PC Telephone TV Kiosk Terminal Online-Services e.g. WWW, Compuserve Radio/Television Data Telephone Data Video LAN Public Network
Part II Secure IP Telephony H.235 H.235 Annex D H.235 Annex E H.235 Annex F H.235 Version 3 H.530 
General H.323 Scenario H.323 Intranet Client Gatekeeper H.323 Internet Client Firewall H.323 Client via PPP Gateway (Access Server) Gateway (H.323/ISDN/H.320) Intranet (LAN) IP Phone (SET) Multicast Unit IP Analog and Digital Phones PSTN Internet PBX
IP Telephony - Security Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],
Specific IP Telephony Security Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],
“Historic” Evolution of H.235 1997 1998 1999 2000 1996 2001 2002 Initial Draft Security Profiles Annex D Annex E started H.323V2 H.323V4 H.323V5? H.235V2 Annex D Annex E approved Annex F H.530 consent H.235V1 approved H.235V3 consent? Core Security Framework Engineering Consolidation Improvement  1st Deployment
H.235 – Security for H.323 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],
H.235 - “H.323 Security“ Security Protocol Architecture AV  Applications Audio G.711 G.722 G.723.1 G.729 Video H.261 H.263 Encryption RTCP H.225.0 Terminal  to  Gatekeeper  Signaling (RAS) Terminal Control and Management Data Applications Security Capabilities Security Capabilities T.124 T.125 Unreliable Transport / UDP, IPX Reliable Transport / TCP, SPX Network Layer / IP /  IPSec Link Layer /......  Physical Layer / .....  T.123 Scope of H.323 Scope of H.235 TLS/SSL Multimedia Applications, User Interface  TLS/SSL Authenti- cation RTP  Scope of T.120 H.225.0 Call  Signaling (Q.931) H.245 System Control
H.530 The Security Problem of H.323 Mobility ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],
Part III Media Gateway Decomposition H.248 Security 
H.248 Security in decomposed Gateways (interim AH) IPSEC AH/ESP H.225.0/ H.245/ H.235 SCN/SS7 RTP/ H.235 TDM voice trunk IKE  H.248 H.245 OLC/ H.235 H.235 RTP payload security Media Gateway  MG IPSEC IKE H.235 Key Management IPSEC IKE Media Gateway Controller MGC
Part IV H.320 Audio/Video Security 
Security for Multimedia Terminals  on circuit-switched networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],
Part V Security Aspects of Data Conferencing 
Security for Computer Supported Collaborative Work (CSCW) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],
Security for Multimedia Conferencing T.120 and Security ,[object Object],[object Object],[object Object],[object Object],
Emergency Telecommunications services Security for Multimedia Applications and Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],
Contacts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Security threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesSecurity threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesIJNSA Journal
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Siddharth Rao
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesJohn Rhoton
 
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Videoguy
 
Phree As In Phone Call
Phree As In Phone CallPhree As In Phone Call
Phree As In Phone Calljohnm_nz
 
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...ijngnjournal
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 
IP Centric Conferencing IP Centric Conferencing IP Centric ...
IP Centric Conferencing IP Centric Conferencing IP Centric ...IP Centric Conferencing IP Centric Conferencing IP Centric ...
IP Centric Conferencing IP Centric Conferencing IP Centric ...Videoguy
 
IoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesIoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesShashi Kiran
 
Encrypted Voice Communications
Encrypted Voice CommunicationsEncrypted Voice Communications
Encrypted Voice Communicationssbwahid
 
WP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of DefenseWP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of DefenseVideoguy
 
Video Teleconferencing (VTC) Technology at the National ...
Video Teleconferencing (VTC) Technology at the National ...Video Teleconferencing (VTC) Technology at the National ...
Video Teleconferencing (VTC) Technology at the National ...Videoguy
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)Fabio Pietrosanti
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 

Was ist angesagt? (17)

Security threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesSecurity threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devices
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...
 
Phree As In Phone Call
Phree As In Phone CallPhree As In Phone Call
Phree As In Phone Call
 
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
IP Centric Conferencing IP Centric Conferencing IP Centric ...
IP Centric Conferencing IP Centric Conferencing IP Centric ...IP Centric Conferencing IP Centric Conferencing IP Centric ...
IP Centric Conferencing IP Centric Conferencing IP Centric ...
 
IoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesIoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative Approaches
 
Encrypted Voice Communications
Encrypted Voice CommunicationsEncrypted Voice Communications
Encrypted Voice Communications
 
WP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of DefenseWP - IP Videoconferencing Security for the Department of Defense
WP - IP Videoconferencing Security for the Department of Defense
 
Video Teleconferencing (VTC) Technology at the National ...
Video Teleconferencing (VTC) Technology at the National ...Video Teleconferencing (VTC) Technology at the National ...
Video Teleconferencing (VTC) Technology at the National ...
 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
 
Network security
Network securityNetwork security
Network security
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 

Ähnlich wie Download

1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdfTouhemiJamel
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.ppt/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.pptVideoguy
 
/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.ppt/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.pptVideoguy
 
/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.ppt/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.pptVideoguy
 
Authentication Methods in Videoconferencing Systems
Authentication Methods in Videoconferencing SystemsAuthentication Methods in Videoconferencing Systems
Authentication Methods in Videoconferencing SystemsVideoguy
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
Voice&Video Client Framework for Public Safety over LTE
Voice&Video Client Framework for Public Safety over LTEVoice&Video Client Framework for Public Safety over LTE
Voice&Video Client Framework for Public Safety over LTEMitchell Smith
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)mashiur
 
Case study about voip
Case study about voipCase study about voip
Case study about voipelmudthir
 
Product Overview: April 2015 (Si3D)
Product Overview: April 2015 (Si3D)Product Overview: April 2015 (Si3D)
Product Overview: April 2015 (Si3D)SI3D systems
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Mobile Security Blanco/Ueda
Mobile Security Blanco/UedaMobile Security Blanco/Ueda
Mobile Security Blanco/UedaFernando Blanco
 

Ähnlich wie Download (20)

Download
DownloadDownload
Download
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.ppt/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.ppt
 
/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.ppt/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.ppt
 
/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.ppt/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.ppt
 
H.323
H.323H.323
H.323
 
Authentication Methods in Videoconferencing Systems
Authentication Methods in Videoconferencing SystemsAuthentication Methods in Videoconferencing Systems
Authentication Methods in Videoconferencing Systems
 
Voip
VoipVoip
Voip
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
Voice&Video Client Framework for Public Safety over LTE
Voice&Video Client Framework for Public Safety over LTEVoice&Video Client Framework for Public Safety over LTE
Voice&Video Client Framework for Public Safety over LTE
 
ece h.323 ppt.pptx
ece h.323 ppt.pptxece h.323 ppt.pptx
ece h.323 ppt.pptx
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
 
Product Overview: April 2015 (Si3D)
Product Overview: April 2015 (Si3D)Product Overview: April 2015 (Si3D)
Product Overview: April 2015 (Si3D)
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Mobile Security Blanco/Ueda
Mobile Security Blanco/UedaMobile Security Blanco/Ueda
Mobile Security Blanco/Ueda
 

Mehr von Videoguy

Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingVideoguy
 
Microsoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresMicrosoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresVideoguy
 
Proxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video StreamingProxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video StreamingVideoguy
 
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksFree-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksVideoguy
 
Instant video streaming
Instant video streamingInstant video streaming
Instant video streamingVideoguy
 
Video Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A SurveyVideo Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A SurveyVideoguy
 
Video Streaming
Video StreamingVideo Streaming
Video StreamingVideoguy
 
Reaching a Broader Audience
Reaching a Broader AudienceReaching a Broader Audience
Reaching a Broader AudienceVideoguy
 
Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...Videoguy
 
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGVideoguy
 
Impact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video StreamingImpact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video StreamingVideoguy
 
Application Brief
Application BriefApplication Brief
Application BriefVideoguy
 
Video Streaming Services – Stage 1
Video Streaming Services – Stage 1Video Streaming Services – Stage 1
Video Streaming Services – Stage 1Videoguy
 
Streaming Video into Second Life
Streaming Video into Second LifeStreaming Video into Second Life
Streaming Video into Second LifeVideoguy
 
Flash Live Video Streaming Software
Flash Live Video Streaming SoftwareFlash Live Video Streaming Software
Flash Live Video Streaming SoftwareVideoguy
 
Videoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions CookbookVideoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions CookbookVideoguy
 
Streaming Video Formaten
Streaming Video FormatenStreaming Video Formaten
Streaming Video FormatenVideoguy
 
iPhone Live Video Streaming Software
iPhone Live Video Streaming SoftwareiPhone Live Video Streaming Software
iPhone Live Video Streaming SoftwareVideoguy
 
Glow: Video streaming training guide - Firefox
Glow: Video streaming training guide - FirefoxGlow: Video streaming training guide - Firefox
Glow: Video streaming training guide - FirefoxVideoguy
 

Mehr von Videoguy (20)

Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video Streaming
 
Microsoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresMicrosoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_Pres
 
Proxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video StreamingProxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video Streaming
 
Adobe
AdobeAdobe
Adobe
 
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksFree-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
 
Instant video streaming
Instant video streamingInstant video streaming
Instant video streaming
 
Video Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A SurveyVideo Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A Survey
 
Video Streaming
Video StreamingVideo Streaming
Video Streaming
 
Reaching a Broader Audience
Reaching a Broader AudienceReaching a Broader Audience
Reaching a Broader Audience
 
Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...
 
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
 
Impact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video StreamingImpact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video Streaming
 
Application Brief
Application BriefApplication Brief
Application Brief
 
Video Streaming Services – Stage 1
Video Streaming Services – Stage 1Video Streaming Services – Stage 1
Video Streaming Services – Stage 1
 
Streaming Video into Second Life
Streaming Video into Second LifeStreaming Video into Second Life
Streaming Video into Second Life
 
Flash Live Video Streaming Software
Flash Live Video Streaming SoftwareFlash Live Video Streaming Software
Flash Live Video Streaming Software
 
Videoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions CookbookVideoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions Cookbook
 
Streaming Video Formaten
Streaming Video FormatenStreaming Video Formaten
Streaming Video Formaten
 
iPhone Live Video Streaming Software
iPhone Live Video Streaming SoftwareiPhone Live Video Streaming Software
iPhone Live Video Streaming Software
 
Glow: Video streaming training guide - Firefox
Glow: Video streaming training guide - FirefoxGlow: Video streaming training guide - Firefox
Glow: Video streaming training guide - Firefox
 

Download

  • 1. ITU-T Security Workshop Session 2 – Security in IP-based networks and services 13-14 May 2002, Seoul/Korea Multimedia Security within Study Group 16 Past, Presence and Future Pierre-André Probst Chair ITU-T SG 16 Martin Euchner Rapporteur Q.G/16
  • 2.
  • 3. ITU-T Study Group 16 Question G “Security of MM Systems & Services“ Part I 
  • 4. Study Group 16 - Security-related Questions in the MediaCom2004 project Q.C - MM Applications & Services F.706 Q.D - Interoperability of MM Systems & Services Q.G - Security of MM Systems & Services H.233, H.234, H.235 Q.1 MM Systems, Terminals & Data Conferencing H.320 H.324 T.120 Q.2 MM over Packet Networks using H.323 systems H.225.0 H.323 H.450 H.460 Q.3 Infrastructure & Interoperability for MM over Packet Network Systems H.245 H.246 H.248 Q.4 Video and Data conferencing using Internet supported Services Q.5 Mobility for MM Systems & Services H.501 H.510 H.530 Q.F - MM Quality of Service & E-2-E Performance in MM Systems 
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Threats to Multimedia Communication WAN Internet Private Network Intranet Unauthorized Access to Resources and Services Intrusion Repudiation (Data, Service) Eavesdropping, Disclosure Billing Fraud Masquerade Manipulation of Data Replay Misuse of Data Misuse of Services Denial of Service Traffic Analysis Insider Threats Internet PC PDA Notebook PC Telephone TV Kiosk Terminal Online-Services e.g. WWW, Compuserve Radio/Television Data Telephone Data Video LAN Public Network
  • 10. Part II Secure IP Telephony H.235 H.235 Annex D H.235 Annex E H.235 Annex F H.235 Version 3 H.530 
  • 11. General H.323 Scenario H.323 Intranet Client Gatekeeper H.323 Internet Client Firewall H.323 Client via PPP Gateway (Access Server) Gateway (H.323/ISDN/H.320) Intranet (LAN) IP Phone (SET) Multicast Unit IP Analog and Digital Phones PSTN Internet PBX
  • 12.
  • 13.
  • 14. “Historic” Evolution of H.235 1997 1998 1999 2000 1996 2001 2002 Initial Draft Security Profiles Annex D Annex E started H.323V2 H.323V4 H.323V5? H.235V2 Annex D Annex E approved Annex F H.530 consent H.235V1 approved H.235V3 consent? Core Security Framework Engineering Consolidation Improvement  1st Deployment
  • 15.
  • 16. H.235 - “H.323 Security“ Security Protocol Architecture AV Applications Audio G.711 G.722 G.723.1 G.729 Video H.261 H.263 Encryption RTCP H.225.0 Terminal to Gatekeeper Signaling (RAS) Terminal Control and Management Data Applications Security Capabilities Security Capabilities T.124 T.125 Unreliable Transport / UDP, IPX Reliable Transport / TCP, SPX Network Layer / IP / IPSec Link Layer /...... Physical Layer / ..... T.123 Scope of H.323 Scope of H.235 TLS/SSL Multimedia Applications, User Interface TLS/SSL Authenti- cation RTP  Scope of T.120 H.225.0 Call Signaling (Q.931) H.245 System Control
  • 17.
  • 18. Part III Media Gateway Decomposition H.248 Security 
  • 19. H.248 Security in decomposed Gateways (interim AH) IPSEC AH/ESP H.225.0/ H.245/ H.235 SCN/SS7 RTP/ H.235 TDM voice trunk IKE  H.248 H.245 OLC/ H.235 H.235 RTP payload security Media Gateway MG IPSEC IKE H.235 Key Management IPSEC IKE Media Gateway Controller MGC
  • 20. Part IV H.320 Audio/Video Security 
  • 21.
  • 22. Part V Security Aspects of Data Conferencing 
  • 23.
  • 24.
  • 25.
  • 26.

Hinweis der Redaktion

  1. H.235 provides plenty of options, with no mandatory settings RAS: 11 , Call Signaling: 12 , Call Control: 10 , Media Stream Encryption: 4 SET, zBsp. IP Phone