Publication:
A practical key agreement scheme for videoconferencing

dc.contributor.authorTogay, Cengiz
dc.contributor.buuauthorTOĞAY, CENGİZ
dc.contributor.departmentMühendislik Fakültesi
dc.contributor.departmentBilgisayar Mühendisliği Bölümü
dc.contributor.orcid0000-0001-5739-1784
dc.contributor.researcheridAAG-9038-2020
dc.date.accessioned2024-07-02T10:15:23Z
dc.date.available2024-07-02T10:15:23Z
dc.date.issued2020-06-12
dc.description.abstractRecently, videoconferencing is becoming more and more pervasive as a consequence of new concerns about privacy and security. The media should be encrypted through the utilization of actual encryption algorithms and group key agreement schemes. In this study, a new key agreement scheme based on Java smart cards is proposed and applied on Web-based real-time communication (WebRTC)-based videoconferencing. In WebRTC, symmetric keys are generated using pseudorandom number generators and shared by two standard protocols, namely, Source Description RTCP Packet (SDES) and Datagram Transport Layer Security (DTLS), through a signaling server. In both methods, the key exchange is open to cryptanalytic attacks, and the administrator of the signaling server can compromise media. This qualitative study aims to investigate privacy during WebRTC-based videoconferencing with respect to symmetric encryption algorithm, randomness of the encryption key, overall security strength, key agreement scheme, and time required to start a conversation. Herein, a new key agreement scheme based on Java smart cards is proposed. The scheme utilizes AES-256 algorithm in GCM mode for media encryption. By means of this approach, the set-up time of a conference is reduced to 562 ms (compared to 1754 ms for the RSA-based approach) for 367 users, and the security strength is increased to 256-bit (as against 112-bit for RSA 2048-bit). A secure random key generator for smart cards is utilized for a key generation instead of pseudorandom number generators. The proposed approach also includes a safety mechanism for smart card failures. We utilize the AVISPA (The Automated Validation of Internet Security Protocols and Applications) tool to test the safety of the proposed scheme.
dc.identifier.doi10.1007/s11042-020-09136-6
dc.identifier.eissn1573-7721
dc.identifier.endpage23728
dc.identifier.issn1380-7501
dc.identifier.issue33-34
dc.identifier.scopus2-s2.0-85086365632
dc.identifier.startpage23711
dc.identifier.urihttps://doi.org/10.1007/s11042-020-09136-6
dc.identifier.urihttps://link.springer.com/article/10.1007/s11042-020-09136-6
dc.identifier.urihttps://hdl.handle.net/11452/42724
dc.identifier.volume79
dc.identifier.wos000539857100003
dc.indexed.wosWOS.SCI
dc.language.isoen
dc.publisherSpringer
dc.relation.journalMultimedia Tools and Applications
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.subjectWebrtc
dc.subjectVideoconferencing
dc.subjectKey agreement
dc.subjectMedia sharing
dc.subjectJava smart card
dc.subjectScience & technology
dc.subjectTechnology
dc.subjectComputer science, information systems
dc.subjectComputer science, software engineering
dc.subjectComputer science, theory & methods
dc.subjectEngineering, electrical & electronic
dc.subjectComputer science
dc.subjectEngineering
dc.titleA practical key agreement scheme for videoconferencing
dc.typeArticle
dspace.entity.typePublication
local.contributor.departmentMühendislik Fakültesi/Bilgisayar Mühendisliği Bölümü
local.indexed.atWOS
local.indexed.atScopus
relation.isAuthorOfPublicationbeb738fd-02d3-4c28-bb2b-7420363b9b71
relation.isAuthorOfPublication.latestForDiscoverybeb738fd-02d3-4c28-bb2b-7420363b9b71

Files