ITU-T H 530-2002 SERIES H AUDIOVISUAL AND MULTIMEDIA SYSTEMS Mobility and Collaboration procedures C Security for mobile multimedia systems and services Symmetric security procedur.pdf
《ITU-T H 530-2002 SERIES H AUDIOVISUAL AND MULTIMEDIA SYSTEMS Mobility and Collaboration procedures C Security for mobile multimedia systems and services Symmetric security procedur.pdf》由会员分享,可在线阅读,更多相关《ITU-T H 530-2002 SERIES H AUDIOVISUAL AND MULTIMEDIA SYSTEMS Mobility and Collaboration procedures C Security for mobile multimedia systems and services Symmetric security procedur.pdf(30页珍藏版)》请在麦多课文档分享上搜索。
1、 INTERNATIONAL TELECOMMUNICATION UNION ITU-T H.530TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2002) SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMSMobility and Collaboration procedures Security for mobile multimedia systems and services Symmetric security procedures for H.323 mobility in H.510
2、ITU-T Recommendation H.530 ITU-T H-SERIES RECOMMENDATIONS AUDIOVISUAL AND MULTIMEDIA SYSTEMS CHARACTERISTICS OF VISUAL TELEPHONE SYSTEMS H.100H.199 INFRASTRUCTURE OF AUDIOVISUAL SERVICES General H.200H.219 Transmission multiplexing and synchronization H.220H.229 Systems aspects H.230H.239 Communicat
3、ion procedures H.240H.259 Coding of moving video H.260H.279 Related systems aspects H.280H.299 SYSTEMS AND TERMINAL EQUIPMENT FOR AUDIOVISUAL SERVICES H.300H.399 SUPPLEMENTARY SERVICES FOR MULTIMEDIA H.450H.499 MOBILITY AND COLLABORATION PROCEDURES Overview of Mobility and Collaboration, definitions
4、, protocols and procedures H.500H.509 Mobility for H-Series multimedia systems and services H.510H.519 Mobile multimedia collaboration applications and services H.520H.529 Security for mobile multimedia systems and services H.530H.539 Security for mobile multimedia collaboration applications and ser
5、vices H.540H.549 Mobility interworking procedures H.550H.559 Mobile multimedia collaboration inter-working procedures H.560H.569 For further details, please refer to the list of ITU-T Recommendations. ITU-T Rec. H.530 (03/2002) i ITU-T Recommendation H.530 Symmetric security procedures for H.323 mob
6、ility in H.510 Summary The purpose of this Recommendation is to describe security procedures for an H.323 multimedia mobility environment. This Recommendation provides the details about the security procedures for H.510. Source ITU-T Recommendation H.530 was prepared by ITU-T Study Group 16 (2001-20
7、04) and approved under the WTSA Resolution 1 procedure on 29 March 2002. Keywords Annex D/H.235, authentication, encryption, integrity, key management, mobility, multimedia security, security profile. ii ITU-T Rec. H.530 (03/2002) FOREWORD The International Telecommunication Union (ITU) is the Unite
8、d Nations specialized agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecomm
9、unications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the proc
10、edure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a tele
11、communication administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence,
12、validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had received notice of intellectual property, protected by patents, which may be requ
13、ired to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database. ITU 2002 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, wit
14、hout the prior written permission of ITU. ITU-T Rec. H.530 (03/2002) iii CONTENTS Page 1 Scope 1 2 Introduction 1 3 Specification conventions. 1 4 Terms and definitions . 3 5 Abbreviations and symbols. 4 6 References. 5 6.1 Normative references 5 6.2 Non-normative references 5 7 Security requirement
15、s and constraints for mobility 6 8 Hop-by-hop security with symmetric cryptographic techniques 7 8.1 Assumptions . 8 8.2 Secure location updating procedures 8 8.2.1 MT to V-GK. 11 8.2.2 V-GK to MRP. 14 8.2.3 MRP to V-BE . 15 8.2.4 V-BE to H-BE 16 8.2.5 H-BE to MRP . 17 8.2.6 MRP to AuF . 17 8.3 Term
16、inal authentication 19 8.4 Unregistration. 21 8.5 Application of the symmetric security protocol in the home domain 21 8.6 List of Object Identifiers 22 9 End-to-end security. 22 ITU-T Rec. H.530 (03/2002) 1 ITU-T Recommendation H.530 Symmetric security procedures for H.323 mobility in H.510 1 Scope
17、 The purpose of this Recommendation is to provide recommendations for security procedures in H.323 mobility environments such as under the scope of ITU-T Rec. H.510. This Recommendation provides the details about the security procedures for ITU-T Rec. H.510. 2 Introduction So far, the signalling cap
18、abilities of ITU-T Rec. H.235 in its versions 1 and 2 4 are designed to handle security in mostly static H.323 5 environments. Those environments and multimedia systems can achieve some limited mobility within gatekeeper zones; ITU-T Rec. H.323 5 in general and ITU-T Rec. H.235 4 specifically provid
19、e only very little support for secure roaming of mobile users and terminals across different domains with many involved entities in a mobility, distributed environment for example. The H.323 mobility scenarios depicted in ITU-T Rec. H.510 6 regarding terminal mobility pose a new situation with their
20、 flexible and dynamic character also from a security point of view. Roaming H.323 users and mobile terminals have to be authenticated by a foreign, visited domain. Likewise, the mobile user would like to obtain evidence about the true identity of the visited domain. In addition to that, it may be al
21、so useful to obtain evidence about the identity of the terminals complementing user authentication. Thus, these requirements demand for mutual authentication of the user and the visited domain and optionally also of the identity of the terminal. As the mobile user is usually known only to the home d
22、omain where the user is subscribed and assigned a password, the visited domain initially does not know the mobile user. As such, the visited domain does not share any established security relationship with the mobile user and the mobile terminal. In order to let the visited domain achieve the authen
23、tication and authorization assurance for the mobile user and for the mobile terminal, the visited domain would relay certain security tasks such as authorization checks or key management to the home domain through intermediate network and service entities. This requires securing the communication an
24、d key management between the visited domain and the home domain too. While, in principle, mobility H.323 environments are more open than closed H.323 networks, there is of course also need to appropriately secure the key management tasks. It is also true that communication within and across the mobi
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTH5302002SERIESHAUDIOVISUALANDMULTIMEDIASYSTEMSMOBILITYANDCOLLABORATIONPROCEDURESCSECURITYFORMOBILEMULTIMEDIASYSTEMSANDSERVICESSYMMETRICSECURITYPROCEDURPDF

链接地址:http://www.mydoc123.com/p-797832.html