An efficient end-to-end security mechanism for IP multimedia subsystem

被引:14
|
作者
Chen, Chi-Yuan [3 ]
Wu, Tin-Yu [4 ]
Huang, Yueh-Min [5 ]
Chao, Han-Chieh [1 ,2 ,3 ]
机构
[1] Natl Ilan Univ, Inst Comp Sci & Informat Engn, Ilan, Taiwan
[2] Natl Ilan Univ, Dept Elect Engn, Ilan, Taiwan
[3] Natl Dong Hwa Univ, Dept Elect Engn, Hualien, Taiwan
[4] Tamkang Univ, Dept Elect Engn, Taipei, Taiwan
[5] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 70101, Taiwan
关键词
IP multimedia subsystem (IMS); Key exchange; End-to-end security;
D O I
10.1016/j.comcom.2008.05.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of the Internet and wireless communications, people make extensive use of portable wireless devices to access information such as voice, data and multimedia, any time from any place, enjoying ubiquitous services. IP multimedia subsystem (IMS) are regarded as the total solution for packet-switched networks, combining wired and wireless infrastructures, providing a standardized interface for information services. We propose the IMSKAAP key exchange protocol and fit it into the IMS session initiation procedure to achieve media plane end-to-end security. This mechanism also mitigates the impact of spam over IP telephony (SPIT) using mutual authentication, fulfilling the lawful interception requirement. The simulation result shows that the proposed mechanism provides a more secure session key exchange and does not need the additional message exchange cost. The voice call end-to-end delay is also lower than the hop-by-hop security associations defined by 3GPP. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:4259 / 4268
页数:10
相关论文
共 50 条
  • [31] End-to-end testing of IP QoS mechanisms
    Shaikh, FA
    McClellan, S
    Singh, M
    Chakravarthy, SK
    [J]. COMPUTER, 2002, 35 (05) : 80 - +
  • [32] End-to-End Privacy for Identity & Location with IP
    Bhatti, Saleem N.
    Haywood, Gregor
    Yanagida, Ryo
    [J]. 2021 IEEE 29TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2021), 2021,
  • [33] End-to-end robust IP soft handover
    Matsuoka, H
    Yoshimura, T
    Ohya, T
    [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 532 - 536
  • [34] On end-to-end congestion avoidance for TCP/IP
    Martin, J
    Nilsson, A
    [J]. HIGH PERFORMANCE NETWORKING, 1998, 8 : 535 - 551
  • [35] Internet security meets the IP Multimedia Subsystem: an overview
    Berger, Andreas
    Gojmerac, Ivan
    Jung, Oliver
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) : 185 - 206
  • [36] Lightweight Dynamic Topic-Centric End-to-End Security Mechanism for MQTT
    Spina, Mattia Giovanni
    De Rango, Floriano
    Marotta, Gerardo Mario
    [J]. PROCEEDINGS OF THE 2021 IEEE/ACM 25TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED SIMULATION AND REAL TIME APPLICATIONS (DS-RT 2021), 2021,
  • [37] End-to-end quality aware optimization for multimedia clouds
    Athanasopoulos, Dirnitris
    Politis, Ilias
    Lykourgiotis, Asimakis
    Tselios, Christos
    Dagiuklas, Tasos
    [J]. 2016 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MULTIMEDIA (TEMU), 2016, : 146 - 150
  • [38] A system for end-to-end authentication of adaptive multimedia content
    Suzuki, T
    Ramzan, Z
    Fujimoto, H
    Gentry, C
    Nakayama, T
    Jain, R
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 237 - 249
  • [39] A Generic End-to-end Monitoring Architecture for Multimedia Services
    Cuadra, A.
    Garces, F.
    del Sol, J. A.
    Nieto, G.
    [J]. 2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009) VOLS 1 AND 2, 2009, : 129 - +
  • [40] End-to-end QoS guarantees in networked multimedia systems
    Nahrstedt, K
    [J]. ACM COMPUTING SURVEYS, 1995, 27 (04) : 613 - 616