A Robust Multimedia Contents Distribution over IP based Mobile Networks



Similar documents
A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

A Review of an MVC Framework based Software Development

MOBILE VIDEO WITH MOBILE IPv6

An Introduction to VoIP Protocols

Security and the Mitel Networks Teleworker Solution (6010) Mitel Networks White Paper

Security and the Mitel Teleworker Solution

Applications that Benefit from IPv6

END-TO-END SECURITY WITH IPSEC AND BIOMETRIC TECHNOLOGY IN VOIP OVER IPV6

Security Considerations for Public Mobile Cloud Computing

Alternative security architecture for IP Telephony based on digital watermarking

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

Securing SIP Trunks APPLICATION NOTE.

Cloud Computing: The Next Computing Paradigm

A Survey of Requirements and Standardization Efforts for IP-Telephony-Security

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Security Policy Revision Date: 23 April 2009

A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval

Mobility Management Framework in Software Defined Networks

What are cloud services?

Security issues in Voice over IP: A Review

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Voice over IP (VoIP) Overview. Introduction. David Feiner ACN Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples

Digital Rights Management for the Online Music Business

Audio and Video for the Internet

Troubleshooting Common Issues in VoIP

NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:

A Study on Secure Electronic Medical DB System in Hospital Environment

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

Digital Rights Management in the Internet

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Ensuring the security of your mobile business intelligence

New security and control protocol for VoIP based on steganography and digital watermarking

Enterprise SM VOLUME 1, SECTION 4.5: WEB CONFERENCING SERVICES (WCS)

Network Security Protocols

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Dynamic Query Updation for User Authentication in cloud Environment

The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator

T.V. SERVICE, INC., dba TVS CABLE MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION

Secure VoIP Transmission through VPN Utilization

Voice over IP is Transforming Business Communications

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Access Control Framework of Personal Cloud based on XACML

Useful Tips for Reducing the Risk of Unauthorized Access for Network Cameras Important

Fundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds:

TDM services over IP networks

Secure SCADA Network Technology and Methods

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP

General Policy Statement:

Is Your Network Ready for VoIP? > White Paper

Mobile VoIP: Managing, scheduling and refining voice packets to and from mobile phones

REDUCING PACKET OVERHEAD IN MOBILE IPV6

VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Securing VoIP Networks using graded Protection Levels

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

3G/Wi-Fi Seamless Offload

Course 4: IP Telephony and VoIP

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services

Internet Protocol Television (IPTV)

Best practices on cellular M2M deployment. Paul Bunnell November 2014

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Software Defined Perimeter Working Group. SDP Hackathon Whitepaper

Overview of Voice Over Internet Protocol

10 Ways to Avoid Ethics Dangers in the Cloud

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon

SVN5800 Secure Access Gateway

Network Working Group. Category: Informational April INETPhone: Telephone Services and Servers on Internet

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf (Team Lead) Imran Bashir Khadija Akram

Study on Remote Access for Library Based on SSL VPN

IPTV Primer. August Media Content Team IRT Workgroup

White Paper: Managing Security on Mobile Phones

Review: Lecture 1 - Internet History

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Implementation of Video Voice over IP in Local Area Network Campus Environment

The Digital Signage System Supporting Multi-Resources Schedule on an Elevator

AT&T Connect Video conferencing functional and architectural overview

VPN. Date: 4/15/2004 By: Heena Patel

A generic monitoring architecture for assuring the QoS in Mobile TV platforms

Quality of Service Management for Teleteaching Applications Using the MPEG-4/DMIF

Indepth Voice over IP and SIP Networking Course

Functional Specifications Document

Performance Measurement of TCP/IP Header Compression

Analysis of IP Network for different Quality of Service

How To Write A Privacy Preserving Firewall Optimization Protocol

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment

Hosted Testing and Grading

A Multi-level Security Mechanism for Secure Data Transmission in SCTP

White Paper. Enterprise IPTV and Video Streaming with the Blue Coat ProxySG >

Digital Transmission Content Protection (DTCP) Technical and Licensing Overview

Computer System Management: Hosting Servers, Miscellaneous

Design and Implementation of Video Conference System Over the Hybrid Peer-to- Peer Networks

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

A Novel Pathway for Portability of Networks and Handing-on between Networks

Transcription:

, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering Department, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon, Korea rdcaytiles@gmail.com, syshin09@hotmail.com, bjpark@hnu.kr *Correspondent Author: Byungjoo Park* (bjpark@hnu.kr) Abstract Multimedia contents distribution over open networks such as the Internet poses numerous issues as to security and mobility. This paper deals with the design of a robust multimedia contents distribution scheme to which it implements both security and mobility. The architecture for its distribution is presented and discussed. The operational functions have been identified that presents security and mobility for its distribution over IP based mobile networks. Keywords: MIPv6, multimedia contents, mobility, security 1. Introduction Multimedia convergence over networked systems has been increasingly developing and thus requires a greater demand for security and distribution mobility. Multimedia refers to a mixture of individual media that comes in various forms such as text, pictures, video, audio, images, etc. Its extensive use and availability over the Internet in all forms provides issues in terms of security and mobility. Since most multimedia contents (e.g., sensitive applications such as medical systems, and military databases) are transmitted over open networks, there is a need for a reliable storage and distribution and transmissions schemes. Currently, we have been surrounded by a multi-level convergent multimedia world where all approaches of communication and information are continually refining to adapt to the continuing demands of technologies [1]. A growing network of information and communication technology devices has increasingly being carried out all aspects of institutional activity and social life such as business, government, art, journalism, health, and education [2]. This paper presents a robust framework for multimedia contents distribution over IP based mobile networks. The framework design implements security and mobility to provide for unlimited distribution of multimedia contents anytime and anywhere. The rest of this paper is organized as follows: Section 2 outlines the multimedia contents distribution framework; Section 3 identifies the operational functions of the multimedia contents distribution scheme; and the concluding remarks in Section 4. 2. Multimedia Contents Distribution Framework The multimedia contents distribution framework aims at integrating the expansiveness of MIPv6 [3] for the mobility management of mobile devices used for accessing multimedia contents. The movement and exchange of communications between the multimedia content provider and mobile devices are patterned to that of the standard protocols of the mobile IP. Authentication scheme has been identified and implemented to verify the mobile user s identity, and thus, providing authorized access to acquire ISSN: 1738-9984 IJSEIA Copyright c 2015 SERSC

multimedia over open networks such as the Internet. The multimedia contents distribution framework is outlined in Figure 1. Figure 1. Multimedia Contents Distribution Framework As outlined in Figure 1, the approaches developed for the design will involve three major components in the secured multimedia contents distribution framework. 1. Multimedia Content Server/Provider: The multimedia content provider implements the following responsibilities: Multimedia content packaging, employing scalable coding and compression schemes. Implementing Quality of Service (QoS) policies for multimedia contents. Security management (Encryption), ensuring a secured delivery and storage of multimedia contents. Management of access control and authorization models, preventing unauthorized access to multimedia contents. Enforcement of usage rules and monitoring the use of multimedia contents. 2. Internet: The Internet will be acting as an intermediary between the mobile terminals and the multimedia contents provider. It serves as the distribution gateway for the multimedia contents and implements the following responsibilities: Resource Management. Resource allocation strategies will be implemented in order to allow an optimal use of the shared resources by the different user categories. 284 Copyright c 2015 SERSC

Buffering Management. This is implemented to support the execution of computing-intensive functionalities that are not supported in mobile terminals. Buffering capabilities must be suppressed in order to alleviate the delay impact of multimedia contents processing. 3. Mobile Devices: The terminal to which users can use for accessing the multimedia contents. The user mobile device implements the following responsibilities: Real-time streaming of multimedia contents. Decoding and decompression management must be progressive to minimize delays. Decryption must be simultaneous with decoding and decompression for un-interrupted real-time streaming. Mobility. The user mobile device must remain connected as the user moves around. Continuous connectivity must be ensured utilizing the standard protocols for mobile IPv6. The mobile devices serve as the multimedia contents acquisition tool. The mobile device mobility adapts the principles of mobile IPv6. The protocols used by the MIPv6 to maintain the user mobile device connectivity will also be utilized. MIPv6 utilizes the IPsec [4], a security protocol suite for securing communications by authenticating and encrypting each IP packet of a communication session. However, IPsec is only limited to secure the data flows between the user mobile device and the multimedia content provider. Thus, there is still a need to authenticate mobile users for unauthorized access of multimedia contents. 3. Multimedia Contents Distribution Operations The functional operations of the multimedia contents distribution framework are described by the following processes: 1. The multimedia content is created, compressed, and then protected. The multimedia content protection can include any of the security standards of multimedia encryption, watermarking, fingerprinting, data hiding, etc. based on the Digital Rights Management (DRM) [5, 6] standards. The multimedia content package may include information about the content provider, vendor, or the Web address to contact for the rights. The security scheme used for the protection can be a standard of the industry (Multimedia Content provider) customized for the particular multimedia content. 2. The protected multimedia content package is deployed on the provider s content server for downloading or streaming as depicted in Figure 2. 3. The user search for related multimedia contents for consumption through web search engine applications in the Internet using their mobile devices. 4. As the desired multimedia content is found, the user requests the multimedia content using their respective mobile devices through web application Copyright c 2015 SERSC 285

requiring user authentication. The multimedia content access request and user authentication is depicted in Figure 3. Multimedia Contents Compression Watermark, Keys, Fingerprint, etc. Protection (Encryption, Watermarking, Fingerprinting, etc.) Multimedia Content Server Usage Rights and Provisions Figure 2. Multimedia Contents Packaging and Storage User request for multimedia content usage Is user in the list? No Register user User information Yes User name, ID, password Authentication, Verification Is user authorized? No Deny Access Provide Session key to user Session key Figure 3. Multimedia Content Access Request and User Authentication 5. The user send authorization request. 286 Copyright c 2015 SERSC

6. If the user is not listed on the authorized users of certain multimedia contents, then they can register with necessary information that meets the requirements imposed by the content provider. 7. If the user is authenticated, then a session key is sent to the user as requirement for accessing the multimedia contents. The usage of multimedia contents may differ based on the imposed usage rules and rights by the content providers which are also based on the DRM. Session Key, User ID Authentication, Verification Is access authorized? No Deny Access Yes Process multimedia content, buffering Transmit requested multimedia contents Progressive multimedia contents Decryption/Decoding /Decompression Continuous realtime access Figure 3. Multimedia Content Access 8. The users can now access the multimedia contents, with their mobile devices capable of decrypting the security imposed on the multimedia content, and be able to decode it for real-time streaming. The user mobile device must be able to perform scalable progressive decryption and decoding in order for a continuous uninterrupted real-time streaming. The Multimedia content access is depicted in Figure 4. 4. Conclusion This paper has presented a robust framework for multimedia contents distribution over IP based mobile networks. This framework implements both security and mobility that ensures unlimited access for multimedia contents anytime and anywhere. A security scheme has been identified in the functional operations to provide for the authenticity and integrity of multimedia contents. Acknowledgements This paper has been supported by the 2015 Hannam University Research Fund. Copyright c 2015 SERSC 287

References [1] H. Jenkins, Convergence Culture, New York University Press, New York, (2006). [2] http://en.wikipedia.org/wiki/technological_convergence. [3] D. Johnson, C. Perkins and J. Arkko, Mobility Support in IPv6, Internet Engineering Task Force (IETF), RFC 3775, (2004) June. [4] R. Thayer, N. Doraswamy and R. Glenn, IP Security Document Roadmap, Internet Engineering Task Force (IETF), RFC 2411, November 1998, http://tools.ietf.org/ pdf/rfc2411.pdf, Retrieved: (2014) August 5. [5] R. J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition, Wiley, ISBN: 978-0-470-06852-6, (2008) March. [6] J. Layton, How Digital Rights Management Works, How Stuffs Works, http://computer. howstuffworks.com/drm.htm, Retrieved: (2014) August 10. 288 Copyright c 2015 SERSC