Skip to main content

IMS Session Management Based on Usage Control

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 186))

Abstract

Multimedia applications have made their way to the wireless/mobile world and this is not likely to change. However, people have not stopped using multimedia services through wired networks and this is also something that is not foreseen to change. What really is changing in the coming networks is the separation of network and service providers; this separation is creating new security challenges since the end user does not have the same trust relationships with all these providers. This paper proposes an architecture for protecting end users from untrusted and unreliable multimedia service providers in Next Generation Networks (NGNs) that utilize the IP Multimedia Subsystem (IMS) for multimedia delivery. Our proposal is based on the Usage Control (UCON) model for monitoring continuously the multimedia content delivered to the end user and ensure that it is the proper content requested by the user.

This work was carried out during the tenure of an ERCIM "Alain Bensoussan" Fellowship Programme. Work partially supported by EU FP7-ICT project NESSoS (Network of Excellence on Engineering Secure Future Internet Software Services and Systems) under the grant agreement n. 256980.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The International Telecommunication Union (ITU), http://www.itu.int/ITU-T/studygroups/com13/ngn2004/working_definition.html

  2. 3GPP TS 23.228: IP multimedia subsystem (IMS). Version 10.2.0, Release 10 (2010)

    Google Scholar 

  3. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC 3261 (2002)

    Google Scholar 

  4. Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter Base Protocol. RFC 3588 (2003)

    Google Scholar 

  5. ITU-T Recommendation Y.2011: General principles and general reference model for next generation network (2004)

    Google Scholar 

  6. Park, J., Sandhu, R.: The UCONABC usage control model. ACM Trans. on Information and System Security (TISSEC) 7(1), 128–174 (2004)

    Article  Google Scholar 

  7. ISO/IEC JTC1/SC29/WG11/N6828: MPEG-7 Overview V.10 (2004)

    Google Scholar 

  8. Moses, T.: eXtensible Access Control Markup Language (XACML). Version 2.0, Technical report, OASIS Standard (2005)

    Google Scholar 

  9. 3GPP TS 33.107: 3G Security; Lawful interception architecture and functions. Version 10.1.1, Release 10 (2010)

    Google Scholar 

  10. Vollbrecht, J., Farrell, S., Gommans, L., Gross, G., de Bruijn, B., de Laat, C., Holdrege, M., Spence, D.: AAA Authorization Framework. RFC 2904 (2000)

    Google Scholar 

  11. Rosenberg, J., Jennings, C.: The Session Initiation Protocol and Spam. RFC 5039 (2008)

    Google Scholar 

  12. Ali, T., Nauman, M., Hadi, F., bin Muhaya, F.: On Usage Control of Multimedia Content in and through Cloud Computing Paradigm. In: 5th International Conference on Future Information Technology (FutureTech), Busan, South Korea, pp. 1–5 (2010)

    Google Scholar 

  13. Ding, Y., Zou, J.: DRM Application in UCONABC. In: Advanced Software Engineering and Its Applications, Hainan Island, China, pp. 182–185 (2008)

    Google Scholar 

  14. Martinelli, F., Mori, P.: On usage control for GRID systems. Future Generation Computer Systems 26(7), 1032–1042 (2010)

    Article  Google Scholar 

  15. Wu, J., Shimamoto, S.: Usage Control Based Security Access Scheme for Wireless Sensor Networks. In: IEEE Intern. Conf. on Communications (ICC), Cape Town, pp. 1–5 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karopoulos, G., Martinelli, F. (2011). IMS Session Management Based on Usage Control. In: Park, J.J., Lopez, J., Yeo, SS., Shon, T., Taniar, D. (eds) Secure and Trust Computing, Data Management and Applications. STA 2011. Communications in Computer and Information Science, vol 186. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22339-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22339-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22338-9

  • Online ISBN: 978-3-642-22339-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics