2021
DOI: 10.18280/ijsse.110107
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Guarantee QoS in a Video Sequence: A New Approach Based on TLS Protocol to Secure Data and RTP to Ensure Real-Time Exchanges

Abstract: Much of the Internet's communication is encrypted, and its content is only accessible at two endpoints, a client and a server. However, any encryption requires a key that must be negotiated without being revealed to potential attackers. The so-called TLS (Transport Layer Security) handshake is often used for this task without obviating that many fundamental parameters of TLS connections are transmitted explicitly. Thus, third parties have access to metadata, including information about the endpoints, how the c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 25 publications
(25 reference statements)
0
1
0
Order By: Relevance
“…Several studies have been proposed to establish methods to secure data exchanges over networks. [34] describe a secure approach that mainly addresses quality of service requirements on a congested communication channel, using the robustness and flexibility of the TLS protocol and its various "cipher suites." They specifically focus on the AES (Advanced Encryption Standard) key, including different sizes (128,192,256), due to its resistance to classical attacks (differential, linear, etc.)…”
Section: Related Workmentioning
confidence: 99%
“…Several studies have been proposed to establish methods to secure data exchanges over networks. [34] describe a secure approach that mainly addresses quality of service requirements on a congested communication channel, using the robustness and flexibility of the TLS protocol and its various "cipher suites." They specifically focus on the AES (Advanced Encryption Standard) key, including different sizes (128,192,256), due to its resistance to classical attacks (differential, linear, etc.)…”
Section: Related Workmentioning
confidence: 99%
“…The transfer occurred when the boat sent the signal through a secure channel. Otherwise, the network will request asymmetric encryption (public key) [35].…”
Section: -2-data Transmission From Boat To Base Stationmentioning
confidence: 99%
“…Classical cryptography methods, such as RSA [25,24,28,29,26,27], were initially developed to protect text-based information, and are not well-suited to the encryption of multimedia data [5][6][7], including images. This is due to several reasons.…”
Section: Introductionmentioning
confidence: 99%