skip to main content
10.1145/1280940.1280994acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
Article

Performance study of IMS authentication procedures in mobile 3G networks

Published: 12 August 2007 Publication History

Abstract

The main idea of the third generation (3G) networks is to merge two of the most important communications systems: Cellular networks and Internet. The IP Multimedia Subsystem was defined by 3GPP as the key element in the 3G architecture that makes it possible to provide ubiquitous cellular access to all the services provided by the Internet. In this scenario a secure mobile service becomes an important issue. Considering that Mobile IPv6 and SIP are key technologies for mobility management and provision of services in IMS respectively, this article shows the impact of different security levels and types of mobility using as security performance parameters the average authentication cost and the average authentication delay and suggests a method where the user can choose the security level as a function of the distance to the IMS Home domain and IMS CN (Correspondent Node) Terminal.

References

[1]
3GPP Technical Specification TS 33.102: "3G security. Security Architecture".
[2]
3GPP Technical Specification TS 33.203: "3G security. Access security for IP-based services".
[3]
3GPP Technical Specification TS 33.210: "3G security. Network Domain Security (NDS). IP network layer security".
[4]
R. Chakravorty, P. Vidales, K. Subramanian, I. Pratt "Performance Issues with Vertical Handovers: Experiences from GPRS Cellular and WLAN hot-spots Integration", IEEE PerCom, March 2004.
[5]
M. Ylianttila, J. Makela, K. Pahlavan, "Analysis of handoffs in a location-aware vertical multi-access network", Computer Networks, Vol. 47, Issue 2, Feb. 2005.
[6]
M. Bernaschi, F. Cacace, G. Iannello, S. Za, A. Pescape, "Seamless internetworking of WLANs and cellular networks: architecture and performance issues in a Mobile IPv6 scenario", IEEE Wireless Communications, Vol. 12, Issue 3, June 2005.
[7]
R. G. Garroppo, S. Giordano, S. Lucetti, G. Risi, "An Experimental Cross-Layer Approach to Improve the Vertical Handover Procedure in Heterogeneous Wireless Networks". Journal of Communications Software and Systems, Vol. 2, No. 1, pp.40--50, March 2006.
[8]
Hyejeong Lee et.al., "Mobility Management Based on the Integration of Mobile IP and Session Initiation Protocol in Next Generation Mobile Data Networks"Vehicular Technology Conference 3 (2003) 2058--2062.
[9]
W. Liang, W. Wang, "On performance analysis of challenge/response based authentication in wireless networks", Computer Networks 48 (2005) 267--288.
[10]
H. Schulzrinne, E.Wedlund, "Application layer Mobility using SIP". Mobile Computing and Communication Review 4 (2000) 47--57.
[11]
F. Vakil, A. Dutta et al., "Supporting Mobility for TCP with SIP". IETF Internet Draft, draft-itsumo-sipping-mobility-tcp-00.txt 2001.
[12]
Christos Politis et.al., "Multilayer Mobility Management for all-IP Networks: Pure SIP vs. Hybrid SIP/Mobile IP". Vehicular Technology Conference 4 (2003) 2500--2504.
[13]
Q. Wang and M.A. Aburgheff "Integrated Mobile IP and SIP Approach for Advanced Location Management". IEEE Wireless Communication 2006.
[14]
N. Banerjee et al. "Analisys of SIP-based mobility management in 4G Wireless Networks". Computer Communications 27 (2004) 697--707.
[15]
D. Johnson et. al.,"Mobility support in IPv6" Draft-ietfmobileip-ipv621.txt' in, IETF Mobile IP, WGr 2003.
[16]
D. Gross, C. Harris,' Fundamentals of Queuing Theory', in Wiley 1974.

Cited By

View all
  • (2012)WiMAX-UMTS Converging Architecture with IMS Signalling Analysis to Achieve QoSProcedia Technology10.1016/j.protcy.2012.10.0036(16-23)Online publication date: 2012
  • (2010)SIP-Based IMS Signaling Analysis for WiMax-3G Interworking ArchitecturesIEEE Transactions on Mobile Computing10.1109/TMC.2010.169:5(733-750)Online publication date: 1-May-2010
  • (2010)A new authentication and key agreement protocol of 3G based on Diffie-Hellman Algorithm2010 2nd International Conference on Computer Engineering and Technology10.1109/ICCET.2010.5485292(V2-110-V2-113)Online publication date: Apr-2010
  • Show More Cited By

Index Terms

  1. Performance study of IMS authentication procedures in mobile 3G networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IWCMC '07: Proceedings of the 2007 international conference on Wireless communications and mobile computing
    August 2007
    716 pages
    ISBN:9781595936950
    DOI:10.1145/1280940
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 August 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. B3G
    2. IMS
    3. SIP
    4. mobile IPv6
    5. mobility
    6. security

    Qualifiers

    • Article

    Conference

    IWCMC07
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2012)WiMAX-UMTS Converging Architecture with IMS Signalling Analysis to Achieve QoSProcedia Technology10.1016/j.protcy.2012.10.0036(16-23)Online publication date: 2012
    • (2010)SIP-Based IMS Signaling Analysis for WiMax-3G Interworking ArchitecturesIEEE Transactions on Mobile Computing10.1109/TMC.2010.169:5(733-750)Online publication date: 1-May-2010
    • (2010)A new authentication and key agreement protocol of 3G based on Diffie-Hellman Algorithm2010 2nd International Conference on Computer Engineering and Technology10.1109/ICCET.2010.5485292(V2-110-V2-113)Online publication date: Apr-2010
    • (2010)Securing the signaling plane in beyond 3G networks: analysis of performance overheadsSecurity and Communication Networks10.1002/sec.1533:2-3(217-232)Online publication date: Mar-2010
    • (2009)Secure and seamless handover solution for real-time applicationsProceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications10.5555/1812598.1812603(19-24)Online publication date: 9-Dec-2009
    • (2009)End-to-end security and seamless handover solution for real-time communications over 3G networksProceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks10.1145/1641944.1641948(13-22)Online publication date: 28-Oct-2009
    • (2009)Seamless Handover and Security Solution for Real-Time ServicesProceedings of the 2009 11th IEEE International Symposium on Multimedia10.1109/ISM.2009.57(363-368)Online publication date: 14-Dec-2009
    • (2009)Secure and seamless handover solution for Real-time applications2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA)10.1109/IMSAA.2009.5439492(1-6)Online publication date: Dec-2009
    • (2008)VPN solution for securing voice over third generation networks2008 2nd International Conference on Internet Multimedia Services Architecture and Applications10.1109/IMSAA.2008.4753921(1-6)Online publication date: Dec-2008

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media