A Secure, Green and Optimized Authentication and Key Agreement Protocol for IMS Network

作者: Saliha Mallem , Chafia Yahiaoui

DOI: 10.1007/978-3-319-77712-2_106

关键词:

摘要: IP multimedia subsystem (IMS) is a prominent architectural framework for services delivery in 4G/5G networks. Authentication critical security mechanism which accords authorized users access to these services. As defined by 3rd Generation Partnership Projects (3GPP), IMS- and Key Agreement protocol (IMS-AKA) the official authentication procedure IMS. However, prone different weaknesses both on (disclosure of identities) performances (complexity) aspects. This paper proposes an IMS-AKA+ that addresses effectively user’s identities protection using key-less cryptography. Furthermore, proposed algorithm significantly reduces process complexity due use Elliptic Curve Cryptography (ECC). Simulations were carried out original IMS-AKA protocol. The results showed up 28% time possible, saving 53% storage space occurs with increased less energy.

参考文章(14)
Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis, Obscuring users' identity in VoIP/IMS environments Computers & Security. ,vol. 43, pp. 145- 158 ,(2014) , 10.1016/J.COSE.2014.04.001
Ja'afer Al-Saraireh, Sufian Yousef, None, A new authentication protocol for UMTS mobile networks Eurasip Journal on Wireless Communications and Networking. ,vol. 2006, pp. 19- 19 ,(2006) , 10.1155/WCN/2006/98107
Eun-Jun Yoon, Kee-Young Yoo, A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves 2010 Fourth International Conference on Network and System Security. pp. 334- 339 ,(2010) , 10.1109/NSS.2010.101
Dilip Sarkar, Theodore Jewell, S Ramakrishnan, Convergence in the calculation of the handoff arrival rate: a log-time iterative algorithm Eurasip Journal on Wireless Communications and Networking. ,vol. 2006, pp. 1- 11 ,(2006) , 10.1155/WCN/2006/15876
Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis, Elisavet Konstantinou, A framework for identity privacy in SIP Journal of Network and Computer Applications. ,vol. 33, pp. 16- 28 ,(2010) , 10.1016/J.JNCA.2009.07.004
N.R. Potlapally, S. Ravi, A. Raghunathan, N.K. Jha, A study of the energy consumption characteristics of cryptographic algorithms and security protocols IEEE Transactions on Mobile Computing. ,vol. 5, pp. 128- 143 ,(2006) , 10.1109/TMC.2006.16
Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis, Caller identity privacy in SIP heterogeneous realms: A practical solution international symposium on computers and communications. pp. 37- 43 ,(2008) , 10.1109/ISCC.2008.4625770
Alessandro Armando, David Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, P Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David Von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Vigano, Laurent Vigneron, None, The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications Computer Aided Verification. ,vol. 3576, pp. 281- 285 ,(2005) , 10.1007/11513988_27
R. Srinivasan, V. Vaidehi, K. Harish, K. Lakshmi Narasimhan, S. Lokeshwer Babu, V. Srikanth, Authentication of Signaling in VoIP Applications asia-pacific conference on communications. pp. 530- 533 ,(2005) , 10.1109/APCC.2005.1554116