Bridging the gap for Next Generation Services: Presence Services on Legacy Devices
- Moyo, Thamsanqa, Thinyane, Mamello, Wright, Madeleine, Irwin, Barry V W, Clayton, Peter G, Terzoli, Alfredo
- Authors: Moyo, Thamsanqa , Thinyane, Mamello , Wright, Madeleine , Irwin, Barry V W , Clayton, Peter G , Terzoli, Alfredo
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428177 , vital:72491 , https://d1wqtxts1xzle7.cloudfront.net/49665432/Paper_2063_20-_20Moyo-libre.pdf?1476717366=andresponse-content-disposi-tion=inline%3B+filename%3DBridging_the_gap_for_Next_Generation_Ser.pdfandEx-pires=1714737455andSignature=RRbr9pzIYSYX8v7FG6FzV4tu3dFXm9qmmqq5WirOhuYdt--mjOfcDHQNLPYZHCmtgYZWdVk6bVFxfGOVJxgXrvkTe2QN2AZV3XfFTZ3mi1s3A5gw2jIXOVHrYUnaf~POgdijdY85mqWhco3vL6Qk3sOZgYjIlTF5ZGAKg1S54W978Nom01cT2~oqRA0Et6mTNmydWfF5MhFxQIq~LNmYqEqmEESKkkWQFwg6xJJUu0uGffbaZXXBA6oDI2cpfkz1FleKyKaRDRJvdfnuTHPoJJ4TzfO6DDVCWKvJ45jaxIzaGmK-03Ai29I-DPyy-c557kZh~kF3rmDg3zrXVNaL8A__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: Next generation services are provided by applications that leverage packet-based domains. A challenge faced by such services is the support for multiple devices, including legacy devices. Our paper examines a strategy for the pro-vision of next generation services on legacy cellular network devices. We ad-vocate that the provision of next generation services via applications on the SIM card allows for the deployment of such services on legacy devices. We demonstrate this assertion through a proof of concept application, SIMPre, that resides on a SIM card. SIMPre implements a presence service by leveraging Java Card, the SIM Application Toolkit and the OMA IMPS standard. We show that it is possible to provide a next generation service on the SIM card such that it ubiquitously integrates with the functionality of a legacy device. We con-clude through this demonstration that the SIM card is a viable option for provid-ing backward compatibility to legacy devices in the implementation of next generation services.
- Full Text:
- Date Issued: 2007
- Authors: Moyo, Thamsanqa , Thinyane, Mamello , Wright, Madeleine , Irwin, Barry V W , Clayton, Peter G , Terzoli, Alfredo
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428177 , vital:72491 , https://d1wqtxts1xzle7.cloudfront.net/49665432/Paper_2063_20-_20Moyo-libre.pdf?1476717366=andresponse-content-disposi-tion=inline%3B+filename%3DBridging_the_gap_for_Next_Generation_Ser.pdfandEx-pires=1714737455andSignature=RRbr9pzIYSYX8v7FG6FzV4tu3dFXm9qmmqq5WirOhuYdt--mjOfcDHQNLPYZHCmtgYZWdVk6bVFxfGOVJxgXrvkTe2QN2AZV3XfFTZ3mi1s3A5gw2jIXOVHrYUnaf~POgdijdY85mqWhco3vL6Qk3sOZgYjIlTF5ZGAKg1S54W978Nom01cT2~oqRA0Et6mTNmydWfF5MhFxQIq~LNmYqEqmEESKkkWQFwg6xJJUu0uGffbaZXXBA6oDI2cpfkz1FleKyKaRDRJvdfnuTHPoJJ4TzfO6DDVCWKvJ45jaxIzaGmK-03Ai29I-DPyy-c557kZh~kF3rmDg3zrXVNaL8A__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: Next generation services are provided by applications that leverage packet-based domains. A challenge faced by such services is the support for multiple devices, including legacy devices. Our paper examines a strategy for the pro-vision of next generation services on legacy cellular network devices. We ad-vocate that the provision of next generation services via applications on the SIM card allows for the deployment of such services on legacy devices. We demonstrate this assertion through a proof of concept application, SIMPre, that resides on a SIM card. SIMPre implements a presence service by leveraging Java Card, the SIM Application Toolkit and the OMA IMPS standard. We show that it is possible to provide a next generation service on the SIM card such that it ubiquitously integrates with the functionality of a legacy device. We con-clude through this demonstration that the SIM card is a viable option for provid-ing backward compatibility to legacy devices in the implementation of next generation services.
- Full Text:
- Date Issued: 2007
Bridging the gap for Next Generation Services: Presence Services on Legacy Devices
- Moyo, Thamsanqa, Thinyane, Mamello, Wright, Madeleine, Irwin, Barry V W, Clayton, Peter G, Terzoli, Alfredo
- Authors: Moyo, Thamsanqa , Thinyane, Mamello , Wright, Madeleine , Irwin, Barry V W , Clayton, Peter G , Terzoli, Alfredo
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428176 , vital:72492 , https://d1wqtxts1xzle7.cloudfront.net/49665432/Paper_2063_20-_20Moyo-libre.pdf?1476717366=andresponse-content-disposi-tion=inline%3B+filename%3DBridging_the_gap_for_Next_Generation_Ser.pdfandEx-pires=1714737455andSignature=RRbr9pzIYSYX8v7FG6FzV4tu3dFXm9qmmqq5WirOhuYdt--mjOfcDHQNLPYZHCmtgYZWdVk6bVFxfGOVJxgXrvkTe2QN2AZV3XfFTZ3mi1s3A5gw2jIXOVHrYUnaf~POgdijdY85mqWhco3vL6Qk3sOZgYjIlTF5ZGAKg1S54W978Nom01cT2~oqRA0Et6mTNmydWfF5MhFxQIq~LNmYqEqmEESKkkWQFwg6xJJUu0uGffbaZXXBA6oDI2cpfkz1FleKyKaRDRJvdfnuTHPoJJ4TzfO6DDVCWKvJ45jaxIzaGmK-03Ai29I-DPyy-c557kZh~kF3rmDg3zrXVNaL8A__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: Next generation services are provided by applications that leverage packet-based domains. A challenge faced by such services is the support for multiple devices, including legacy devices. Our paper examines a strategy for the pro-vision of next generation services on legacy cellular network devices. We ad-vocate that the provision of next generation services via applications on the SIM card allows for the deployment of such services on legacy devices. We demonstrate this assertion through a proof of concept application, SIMPre, that resides on a SIM card. SIMPre implements a presence service by leveraging Java Card, the SIM Application Toolkit and the OMA IMPS standard. We show that it is possible to provide a next generation service on the SIM card such that it ubiquitously integrates with the functionality of a legacy device. We con-clude through this demonstration that the SIM card is a viable option for provid-ing backward compatibility to legacy devices in the implementation of next generation services.
- Full Text:
- Date Issued: 2007
- Authors: Moyo, Thamsanqa , Thinyane, Mamello , Wright, Madeleine , Irwin, Barry V W , Clayton, Peter G , Terzoli, Alfredo
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428176 , vital:72492 , https://d1wqtxts1xzle7.cloudfront.net/49665432/Paper_2063_20-_20Moyo-libre.pdf?1476717366=andresponse-content-disposi-tion=inline%3B+filename%3DBridging_the_gap_for_Next_Generation_Ser.pdfandEx-pires=1714737455andSignature=RRbr9pzIYSYX8v7FG6FzV4tu3dFXm9qmmqq5WirOhuYdt--mjOfcDHQNLPYZHCmtgYZWdVk6bVFxfGOVJxgXrvkTe2QN2AZV3XfFTZ3mi1s3A5gw2jIXOVHrYUnaf~POgdijdY85mqWhco3vL6Qk3sOZgYjIlTF5ZGAKg1S54W978Nom01cT2~oqRA0Et6mTNmydWfF5MhFxQIq~LNmYqEqmEESKkkWQFwg6xJJUu0uGffbaZXXBA6oDI2cpfkz1FleKyKaRDRJvdfnuTHPoJJ4TzfO6DDVCWKvJ45jaxIzaGmK-03Ai29I-DPyy-c557kZh~kF3rmDg3zrXVNaL8A__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: Next generation services are provided by applications that leverage packet-based domains. A challenge faced by such services is the support for multiple devices, including legacy devices. Our paper examines a strategy for the pro-vision of next generation services on legacy cellular network devices. We ad-vocate that the provision of next generation services via applications on the SIM card allows for the deployment of such services on legacy devices. We demonstrate this assertion through a proof of concept application, SIMPre, that resides on a SIM card. SIMPre implements a presence service by leveraging Java Card, the SIM Application Toolkit and the OMA IMPS standard. We show that it is possible to provide a next generation service on the SIM card such that it ubiquitously integrates with the functionality of a legacy device. We con-clude through this demonstration that the SIM card is a viable option for provid-ing backward compatibility to legacy devices in the implementation of next generation services.
- Full Text:
- Date Issued: 2007
DRAPA-a flexible framework for evaluating the quality of VoIP components
- Clayton, Bradley, Terzoli, Alfredo, Irwin, Barry V W
- Authors: Clayton, Bradley , Terzoli, Alfredo , Irwin, Barry V W
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428213 , vital:72494 , https://d1wqtxts1xzle7.cloudfront.net/3456214/No_268_-_Clayton-libre.pdf?1390832682=andresponse-content-disposi-tion=inline%3B+filename%3DDRAPA_a_flexible_framework_for_evaluatin.pdfandExpires=1714742712andSignature=FTQ3UMH7w9KMXeuld-NbnboBP9kqza7jDnVI2AJMFrhV6fkW56bPgPZKVAY-bKJFqJP-jq4h4JwRhWVuCA-oIIA4ckbhKHA4OoL4X5DYtlujkhkombcp-B5fVR02AioXBazDtfnTGvZLE21wluH0BnkBL9OAQSen7YJDzDsYtNH2pFIn06Nmg9-kDaJoRmW9KWlQs8BwyaXml4-pG~FrpiGCRclANXBSpmsxYSdJyZAnHq2ZZNqx9pEHigaYHUUgllDq64dp8C8R84xAbbbRcvt-XNhuQ~fU2AkJILms4FUkJSjGI0E-TOKhh7vQiVIh5KzZX8MOiS~rEuBH6ekx8g__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: When adding to or altering a VoIP system, the overall performance and quality of the system is at risk. For example, adding confidentiality, in-tegrity and authentication (CIA) would incur an overhead for each addi-tional security method. A method of measuring the performance of a VoIP system after a change or addition is needed. This paper describes a framework and testbed (DRAPA) which provides a flexible base from which VoIP performance analysis systems can be built. DRAPA gener-ates and collects data from any part of a VoIP system within a real do-main. This paper also discusses the flexibility of DRAPA. While security is our primary focus, DRAPA allows the user to configure the testbed and change the type and nature of data to be collected.
- Full Text:
- Date Issued: 2006
- Authors: Clayton, Bradley , Terzoli, Alfredo , Irwin, Barry V W
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428213 , vital:72494 , https://d1wqtxts1xzle7.cloudfront.net/3456214/No_268_-_Clayton-libre.pdf?1390832682=andresponse-content-disposi-tion=inline%3B+filename%3DDRAPA_a_flexible_framework_for_evaluatin.pdfandExpires=1714742712andSignature=FTQ3UMH7w9KMXeuld-NbnboBP9kqza7jDnVI2AJMFrhV6fkW56bPgPZKVAY-bKJFqJP-jq4h4JwRhWVuCA-oIIA4ckbhKHA4OoL4X5DYtlujkhkombcp-B5fVR02AioXBazDtfnTGvZLE21wluH0BnkBL9OAQSen7YJDzDsYtNH2pFIn06Nmg9-kDaJoRmW9KWlQs8BwyaXml4-pG~FrpiGCRclANXBSpmsxYSdJyZAnHq2ZZNqx9pEHigaYHUUgllDq64dp8C8R84xAbbbRcvt-XNhuQ~fU2AkJILms4FUkJSjGI0E-TOKhh7vQiVIh5KzZX8MOiS~rEuBH6ekx8g__andKey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: When adding to or altering a VoIP system, the overall performance and quality of the system is at risk. For example, adding confidentiality, in-tegrity and authentication (CIA) would incur an overhead for each addi-tional security method. A method of measuring the performance of a VoIP system after a change or addition is needed. This paper describes a framework and testbed (DRAPA) which provides a flexible base from which VoIP performance analysis systems can be built. DRAPA gener-ates and collects data from any part of a VoIP system within a real do-main. This paper also discusses the flexibility of DRAPA. While security is our primary focus, DRAPA allows the user to configure the testbed and change the type and nature of data to be collected.
- Full Text:
- Date Issued: 2006
Integrating Secure RTP into the Open Source VoIP PBX Asterisk
- Clayton, Bradley, Irwin, Barry V W, Terzoli, Alfredo
- Authors: Clayton, Bradley , Irwin, Barry V W , Terzoli, Alfredo
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428735 , vital:72532 , https://d1wqtxts1xzle7.cloudfront.net/84872934/66_Paper-libre.pdf?1650920302=response-content-disposi-tion=inline%3B+filename%3DIntegrating_Secure_RTP_into_the_Open_Sou.pdfExpires=1714744382Signature=PijjCGW0qcvkqRe-2R55HocKLvz9Ljw8jmhQvRQEi9YqJl7eWSiYnvs9CogY4u4bmDTYTLpvkA-nlfbiszg-s7Cq2nbLn3PUdfJ5cA11ujboi~i7oSoem7smuN1YCVZlg7FnZRd6mOXdTry9UAh8TlWyndF6pY1RXtc7bgb5cWeK4ggJ7~bM0HUXEbUKKa-abCZnGNrAZ59JIdL6CNx1Sht3o5mZTcyRL3PNVSOz17lldXi4FsAOEUwsVV-uv04hzp6pe6Qv5WbAP6tqk7deyoLUwk58A9F-PaJlOLy2gDAVLnbKT8RrxYg8tqv8SuBhPWb32CefBxv486N3F6izZw__Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: Implementations of Voice over Internet Protocol (VoIP) have focused, up to now, mainly on the need to transport data in real-time, often at the expense of security. The neglect of secure VoIP is often intentional, as developers are striving to minimise overheads and delays. The Secure Real-Time Protocol (SRTP) has the potential to secure real-time streams without exacting too high a performance price. SRTP is the addition of security to the audio/video profile used in the Real-Time Transport Protocol (RTP). SRTP adds confidentiality, integrity and op-tionaly authenticity to RTP media streams. This paper focuses on the integration of SRTP into Asterisk, an open-source VoIP PBX. SRTP support has recently been added to Asterisk by Mikael Magnusson. This paper analyses Magnusson’s implementation, contrasting it to a proof-of-concept implementation developed independently at Rhodes University. The interoperability of SRTP implementations cannot be taken for granted, given the relatively recent standardization of the pro-tocol, and so Magnusson’s implementation is tested against another SRTP implementation. Finally, the paper highlights a major shortcoming in Magnusson’s implementation, namely that the exchange of encryp-tion keys is done in the clear. It concludes by proposing possible solu-tions, such as TLS, IPSec and MIkey.
- Full Text:
- Date Issued: 2006
- Authors: Clayton, Bradley , Irwin, Barry V W , Terzoli, Alfredo
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428735 , vital:72532 , https://d1wqtxts1xzle7.cloudfront.net/84872934/66_Paper-libre.pdf?1650920302=response-content-disposi-tion=inline%3B+filename%3DIntegrating_Secure_RTP_into_the_Open_Sou.pdfExpires=1714744382Signature=PijjCGW0qcvkqRe-2R55HocKLvz9Ljw8jmhQvRQEi9YqJl7eWSiYnvs9CogY4u4bmDTYTLpvkA-nlfbiszg-s7Cq2nbLn3PUdfJ5cA11ujboi~i7oSoem7smuN1YCVZlg7FnZRd6mOXdTry9UAh8TlWyndF6pY1RXtc7bgb5cWeK4ggJ7~bM0HUXEbUKKa-abCZnGNrAZ59JIdL6CNx1Sht3o5mZTcyRL3PNVSOz17lldXi4FsAOEUwsVV-uv04hzp6pe6Qv5WbAP6tqk7deyoLUwk58A9F-PaJlOLy2gDAVLnbKT8RrxYg8tqv8SuBhPWb32CefBxv486N3F6izZw__Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: Implementations of Voice over Internet Protocol (VoIP) have focused, up to now, mainly on the need to transport data in real-time, often at the expense of security. The neglect of secure VoIP is often intentional, as developers are striving to minimise overheads and delays. The Secure Real-Time Protocol (SRTP) has the potential to secure real-time streams without exacting too high a performance price. SRTP is the addition of security to the audio/video profile used in the Real-Time Transport Protocol (RTP). SRTP adds confidentiality, integrity and op-tionaly authenticity to RTP media streams. This paper focuses on the integration of SRTP into Asterisk, an open-source VoIP PBX. SRTP support has recently been added to Asterisk by Mikael Magnusson. This paper analyses Magnusson’s implementation, contrasting it to a proof-of-concept implementation developed independently at Rhodes University. The interoperability of SRTP implementations cannot be taken for granted, given the relatively recent standardization of the pro-tocol, and so Magnusson’s implementation is tested against another SRTP implementation. Finally, the paper highlights a major shortcoming in Magnusson’s implementation, namely that the exchange of encryp-tion keys is done in the clear. It concludes by proposing possible solu-tions, such as TLS, IPSec and MIkey.
- Full Text:
- Date Issued: 2006
Securing Real-time multimedia: A brief survey
- Cloran, Russell, Irwin, Barry V W, Terzoli, Alfredo
- Authors: Cloran, Russell , Irwin, Barry V W , Terzoli, Alfredo
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428887 , vital:72543 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Research/020_Article.pdf
- Description: Voice over IP (VoIP) enables cheaper and easier communication but can be less secure than the traditional TDM network. This paper is a guide to securing VoIP networks using current technologies and best practices. Physical and logical segregation of data and multimedia traf-fic is discussed. Current VoIP analysis tools are described with specific reference to their usefulness as a means of evaluating the quality of a secure VoIP system. Protocol enhancements, such as the Secure Re-al-time Transport Protocol and transport layer protection such as of-fered by IPSec, are discussed and evaluated. Finally, various secure VoIP implementation scenarios are discussed, with configurations combining these security solutions presented in the paper.
- Full Text:
- Date Issued: 2005
- Authors: Cloran, Russell , Irwin, Barry V W , Terzoli, Alfredo
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428887 , vital:72543 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Research/020_Article.pdf
- Description: Voice over IP (VoIP) enables cheaper and easier communication but can be less secure than the traditional TDM network. This paper is a guide to securing VoIP networks using current technologies and best practices. Physical and logical segregation of data and multimedia traf-fic is discussed. Current VoIP analysis tools are described with specific reference to their usefulness as a means of evaluating the quality of a secure VoIP system. Protocol enhancements, such as the Secure Re-al-time Transport Protocol and transport layer protection such as of-fered by IPSec, are discussed and evaluated. Finally, various secure VoIP implementation scenarios are discussed, with configurations combining these security solutions presented in the paper.
- Full Text:
- Date Issued: 2005
- «
- ‹
- 1
- ›
- »