skip to main content
10.1145/1821748.1821798acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
short-paper

Efficient identity-based authentication for IMS based services access

Published:14 December 2009Publication History

ABSTRACT

The IP Multimedia Subsystem (IMS) is an access-independent, IP based service control architecture. Although, the security and data privacy aspects are very important in the IMS global objectives, they attract little attention so far. Secure access to multimedia services is based on SIP and HTTP digest on top of IMS architecture. Authentication is only based on SIP and is directly coupled to the SIP registration procedure. The third Generation Partnership Project (3GPP) provided Generic Bootstrapping Architecture (GBA) to authenticate the subscriber before accessing multimedia services over HTTP however through a heavy process. In this paper, we propose a new IMS Service Authentication scheme using Identity Based cryptography (IBC). Our solution enhances the security of the IMS authentication process and is promising in enabling new social services since it is based on the user's identity (which could be mapped to his presence). We analyzed the security of our new protocol and we began the evaluation of its performance. We obtained a better security as well as a performance gain compared to the classical service authentication approach in IMS.

References

  1. I. Tirado, "IP Multimedia Subsystem (IMS) signaling core security", Proceedings of the 5th annual conference on Information security curriculum development, pages 59--63, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. RFC 3310, "Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA)", 2002Google ScholarGoogle Scholar
  3. D. Priselac, M. Mikuc, "Security risks of pre-IMS AKA access security solutions", available in http://www.ericsson.com/hr/etk/dogadjanja/mipro_2008/1227.pdfGoogle ScholarGoogle Scholar
  4. 3GPP2 S.R0086-0: "IMS Security Framework"Google ScholarGoogle Scholar
  5. L. Wu, Y. Zhangb and F. Wang, "A new provably secure authentication and key agreement protocol for SIP using ECC", Computer Standards & Interfaces Volume 31, Issue 2, February 2009, Pages 286--291 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Huang and J. Li, "One-Pass Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS", Advanced Information Networking and Applications, AINA '07, page(s): 482--489 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Ring, K. Raymond Choo and E. Foo, "A New Authentication Mechanism and Key Agreement Protocol for SIP Using Identity-based Cryptography", AusCERT2006 R&D Stream. Gold Coast, Australia, 2006.Google ScholarGoogle Scholar
  8. D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing", Proceedings of CRYPTO '01, LNCS 2139, pages 213--229, Springer-Verlag, 2001 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. G. Camarillo and M.-A. Garcia-Martin, "The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds", Hoboken, NJ: Wiley, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 3rd Generation Partnership Project (3GPP) http://www.3gpp.org/Google ScholarGoogle Scholar
  11. Telecoms & Internet converged Services & Protocols for Advanced Networks (TISPAN), http://www.etsi.org/tispan/Google ScholarGoogle Scholar
  12. 3GPP Technical Specification TS 33.102: "3G security. Security Architecture".Google ScholarGoogle Scholar
  13. 3GPP TS 33.203: "3G security. Access security for IP-based services".Google ScholarGoogle Scholar
  14. 3GPP TS 33.210: "3G security. Network Domain Security (NDS). IP network layer security".Google ScholarGoogle Scholar
  15. 3GPP TS 123 228 "IP Multimedia Subsystem (IMS); Stage 2".Google ScholarGoogle Scholar
  16. 3GPP TS 133.220: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture".Google ScholarGoogle Scholar
  17. A. Shamir, "Identity-Based Cryptosystems and Signature Schemes" 1984.Google ScholarGoogle Scholar
  18. http://www.openimscore.org/Google ScholarGoogle Scholar
  19. I. M. Mkwawa, D. D. Kouvatsos "Performance Evaluation and Analysis of IP Multimedia Subsystems", Fifth International Conference on Performance Modelling and Evaluation of Heterogeneous Networks, February 18th -21st, 2008 Karlskrona SwedenGoogle ScholarGoogle Scholar
  20. Miracl: "Multiprecision Integer and Rational Arithmetic C/C++ Library", available in http://www.shamus.ie/Google ScholarGoogle Scholar

Index Terms

  1. Efficient identity-based authentication for IMS based services access

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        MoMM '09: Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
        December 2009
        663 pages
        ISBN:9781605586595
        DOI:10.1145/1821748

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 December 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader