Protect VoIP and other Internet multimedia applications with these key management mechanisms

Key management is a fundamental part of protecting Internet multimedia applications such as VoIP, video on demand, conferencing, and others, but key management protocols are difficult to design. In this chapter download from Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures, study two methods, MIKEY and STRP Security Descriptions, that are currently implemented by vendors to support security requirements to provide authentication, confidentiality, and integrity of media streams. In addition, explore ZRTP, which is currently an IETF "draft" but is likely to become a viable solution for peer-to-peer confidentiality.


Key management is a fundamental part of protecting Internet multimedia applications such as VoIP, video on demand, conferencing, and others, but key management protocols are difficult to design. In this chapter download from Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures, study two methods, MIKEY and STRP Security Descriptions, that are currently implemented by vendors to support security requirements to provide authentication, confidentiality, and integrity of media streams. In addition, explore ZRTP, which is currently an IETF "draft" but is likely to become a viable solution for peer-to-peer confidentiality.

Title: Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Author: Peter Thermos, Ari Takanen
Publisher: Addison Wesley Professional
Chapter 7: Key Management Mechanisms
ISBN: 0-321-43734-9; Copyright 2008, Addison Wesley Professional. All rights reserved.
Used with permission from the publisher. Available from booksellers or direct from Addison Wesley Professional

(Is this item miscategorized? Does it need more tags? Let us know.)

Format: PDF | Size: 1,076KB | Date: Sep 2007 | Version: 1.0 | System Requirements: Adobe Acrobat Reader 5.0 or later | License: copyright | Downloads: 68





0 comments: