Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks

With the all IP based Next Generation Networks being deployed around the world, the use of real-time multimedia service applications is being extended from normal daily communications to emergency situations. However, currently different emergency providers utilise differing networks and different technologies. As such, conversations could be terminated at the setup phase or data could be transmitted in plaintext should incompatibility issues exit between terminals. To this end, a novel security gateway that can provide the necessary security support for incompatible terminals was proposed, developed and implemented to ensure the successful establishment of secure real-time multimedia conversations. A series of experiments were conducted to evaluate the security gateway through the use 40 Boghe softphone acting as the terminals. The experimental results demonstrate that the best performance of the prototype was achieved by utilising a multithreading and multi-buffering technique, with an average of 582 microseconds processing overhead. Based upon the ITU-Ts 150 milliseconds one way delay recommendation for voice communications, it is envisaged that such a marginal overhead will not be noticed by users in practice.

[1]  Dan Wing,et al.  Session Description Protocol (SDP) Security Descriptions for Media Streams , 2006, RFC.

[2]  Jon Callas,et al.  ZRTP: Media Path Key Agreement for Unicast Secure RTP , 2011, RFC.

[3]  Zhang Lu,et al.  A design scheme of PSTN media gateway , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..

[4]  Alexander L. Wijesinha,et al.  An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP , 2009, 2009 Third International Conference on Network and System Security.

[5]  Tian Tian,et al.  MIKEY-TICKET: Ticket-Based Modes of Key Distribution in Multimedia Internet KEYing (MIKEY) , 2011, RFC.

[6]  Steven Furnell,et al.  A Technology Independent Security Gateway for Real-Time Multimedia Communication , 2013, NSS.

[7]  Richard D. Gitlin,et al.  Next-generation networks , 1998, Bell Labs Technical Journal.

[8]  Mário Serafim Nunes,et al.  VTOA/VoIP/ISDN telephony gateway , 1999, 1999 2nd International Conference on ATM. ICATM'99 (Cat. No.99EX284).

[9]  Ganapathy S. Sundaram,et al.  MIKEY-IBAKE: Identity-Based Authenticated Key Exchange (IBAKE) Mode of Key Distribution in Multimedia Internet KEYing (MIKEY) , 2011, RFC.

[10]  Alberto Conte,et al.  Experiencing Megaco protocol for controlling non-decomposable VoIP gateways , 2000, Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium.

[11]  P. M. Santos,et al.  A robust architecture for IP telephony systems interconnection , 2003, 2003 IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM 2003) (Cat. No.03CH37490).

[12]  Randall J. Atkinson,et al.  IP Telephony Requirements for Emergency Telecommunication Service (ETS) , 2004, RFC.

[13]  David A. McGrew The Use of AES-192 and AES-256 in Secure RTP , 2011, RFC.

[14]  Mats Näslund,et al.  The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.

[15]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[16]  Gerald Q. Maguire,et al.  Evaluation of VoIP media security for smartphones in the context of IMS , 2011, 2011 IEEE Swedish Communication Technologies Workshop (Swe-CTW).

[17]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[18]  Baugher,et al.  The Secure Real-Time Transport Protocol , 2003 .