The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper provides a performance study for securing media streaming based on hash chain methodology. We introduce a new technique that combines the signature of window-based hash chain with redundancy codes for achieving high reliability and robustness against many attacks. Also, the Window technique integrates the Time-Stamped which strongly eliminates the anti-replay attack. It will also control...
The following topics are dealt with: autonomic event computing; user-provided networking; broadband single carrier; HeterWMN mobile networks; HeterWMN wireless sensor networks; femtocell networks; exploiting shared media; aerial channel analysis and physical data links; handover and network selection in future broadband networks; performance modelling; coding for memories; cognitive radio, VANET and...
Session Initiation Protocol (SIP) is an application-layer signaling and control protocol for creating, modifying and terminating sessions including Internet telephone calls, multimedia distribution and multimedia conferences. Flexible, extensible and open, SIP has a complete security mechanism that allows security of both media and signaling. SIP RFC recommends the use of TLS or DTLS to provide an...
The following topics are dealt with: communication theory; signal processing; wireless communication system; mobile network; Internet; quality of service; ad hoc network; wireless sensor network; wireless mesh network; optical network; multimedia services; and information system security.
The broadband satellite multimedia (BSM) architecture standardised by ETSI defines a satellite independent service access point (SI-SAP) interface layer that separates the satellite independent features of the upper layers from the satellite dependant features of the lower layers, and provides a mechanism to carry IP-based protocols over these satellite dependent lower layers. This enables interoperability...
Today the world is moving towards the 4th generation cellular network. The IMS framework facilitates both the transmission of voice and data over the Internet at a lower cost. However all the security considerations made by this framework have shown concerns about the service providers and not much care has been taken for the security of the consumer. As more and more people are using this technology...
The following topics are dealt with: multimedia security; multimedia social network; trusted computing; multimedia computing; network security; watermarking; steganography; Internet-based services; and multimedia service application.
Quickly acquiring the data required from network node environments to share files in the vast P2P network environment is a challenging job. Many researches have proposed data sharing mechanisms and scheduling methods in P2P environments, however, most focused on the efficient utilization of network bandwidth, using greedy methods to deliver the data to the client end as early as possible. However,...
IPv6 provides a platform for new Internet functionality. It includes support for real-time flows, provider selection, and host mobility, end-to-end security, auto-configuration, and auto-reconfiguration. It solves the Internet scaling problem, provides a flexible transition mechanism for the current Internet, and was designed to meet the needs of new markets such as nomadic personal computing devices,...
The widespread application of P2P file sharing brings about some critical problems, such as security, piracy and intellectual property. In order to protect the intellectual property rights of radio film and television resources, in this paper, under the environment of China next generation Internet (CNGI), a PCADRM (P2P-based content access digital rights management) system is constructed, which is...
Personal devices and access systems have recently become more diversified, and there is a need for technology that enables users to flexibly and securely create their own private services in a user-driven manner, utilizing the presently available access systems and devices. To this end, the authors have designed user-driven service creation architecture (USCA). It enables users to create a secure...
The evolution of wireless handsets from simple mobile phones to smart devices, capable of capturing multimedia information and accessing Internet, has enabled its users to share multimedia contents with other network-capable devices in the vicinity or across the Internet. However, multimedia contents may include private information that a user may share only if it is secure from sniffing and other...
The main idea of the third generation (3G) networks is to merge two of the most important communication systems: cellular networks and Internet. The IP multimedia subsystem (IMS) defined by 3GPP is a technology designed to provide robust multimedia services across roaming boundaries and over diverse access technologies. In this communication converged world, the challenging issues are security and...
SIP is an application-level signaling protocol that manages a mutual multimedia communication session. Presently, SIP is widely used with Internet messaging, games and with VoIP (voice over IP) due to advantages such as its simplicity, flexibility and variety of protocols. However, SIP is associated with many types of security issues and requires a countermeasure device against call-disturbance attacks...
The recent and massive deployment of voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. In this paper, we will present a new attack against the authentication mechanism of SIP. This attack allows to perform toll fraud and call hijacking. We will detail the formal specification method that allowed to detect this...
The growing demand for voice services and multimedia delivery over the Internet has raised SIPpsilas popularity making it a subject of extensive research. SIP is an application layer control signaling protocol, whose main purpose is to create, modify and terminate multimedia sessions. Research has shown that SIP has a number of security issues that must be solved in order to increase its trustworthiness...
In order to provide multimedia services, which would allow users to participate in the modification of forms and contents of the current session in real time, we have begun to create an important component of successful online communication and education - a software based client. This kind of a smart endpoint needs to meet two conditions. The first requires the client to be platform-independent,...
Internet Protocol Security (IPSec) is a standard for securing internet communication and, a widely deployed mechanism for implementing Virtual Private Networks (VPNs). This paper present the performance analysis of IPSec VPNs for videoconference in real time multimedia traffic over a secure communication links by implementing an IPSec-based VPNs technology. The impact of IPSec VPNs on multimedia under...
Computer webcams have been used only for video chats and nowadays almost every internet user has a webcam with his/her computer. Similarly GPRS in mobile phones is often used to surf internet through mobile phones. As security is a big issue for a peaceful life a new technique has been suggested to use webcam and GPRS for visual security purpose. WMS is a new, easy and efficient video surveillance...
This paper describes the security features of Real time Transport Protocol features like confidentiality, integrity and authentication. The main goal of this research is the confidentiality to provide security to data, authentication which identify legal users, and optimization of multiple paths for Quality of Service (QoS). In multimedia application it is expected that the router should be able to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.