An Address Resolution and Key Exchange Protocol for Conferencing Applications on the Internet

نویسندگان

  • Michael Fromme
  • Lutz Grüneberg
  • Helmut Pralle
چکیده

Many multimedia conference initiation and control protocols like the Session Invitation Protocol or ITU-T H.323 are likely to coexist on the Internet. Although these protocols have di erent invitation schemes and di erent addressing mechanisms, they all need transport addresses to send conference calls. Considering users mobility, address redirection mechanisms were built into invitation protocols, but in a way speci c to that particular protocol. The Confman Address Resolution Protocol (ConfARP) is a simple protocol designed to allow address translations from logical addresses to transport addresses independent of the applied conference initiation protocol. Further ConfARP can deliver encryption keys for the conference setup along with the transport addresses to support encrypted conference calls.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Secure and Efficient Decentralized Group Key Establishment Protocol for Robust Group Communication

Now-a-days Internet has become the common media of communication. Many group communication application such as pay-per-view, stock quote distribution, voiceand video-conferencing, white-boards, distributed simulations, and replicated servers of all types, etc can easily be conducted on the Internet. For conducting such applications, group key is often needed, which can be established by group k...

متن کامل

AuthoCast - a mobility-compliant protocol framework for multicast sender authentication

Mobility is considered a key technology of the next generation Internet and has been standardized within the IETF. Rapidly emerging multimedia group applications such as IPTV, massive mutliplayer games (MMORPGs) and video conferencing increase the demand for mobile group communication, but a standard design of mobile multicast is still awaited. The open problem poses significant operational and...

متن کامل

Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)

Over the last years‎, ‎the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. ‎Security and efficiency could be the main challenges of that communication‎‎. ‎‎On the other hand, ‎ authenticity and confidentiality are two important goals to provide desired security in an information system‎, including IoT-based applications. An Authentication an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998