A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services

A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services

Nikos Vrakas, Costas Lambrinoudakis
Copyright: © 2011 |Volume: 4 |Issue: 2 |Pages: 16
ISSN: 1935-570X|EISSN: 1935-5718|EISBN13: 9781613507803|DOI: 10.4018/jitsa.2011070103
Cite Article Cite Article

MLA

Vrakas, Nikos, and Costas Lambrinoudakis. "A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services." IJITSA vol.4, no.2 2011: pp.32-47. http://doi.org/10.4018/jitsa.2011070103

APA

Vrakas, N. & Lambrinoudakis, C. (2011). A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services. International Journal of Information Technologies and Systems Approach (IJITSA), 4(2), 32-47. http://doi.org/10.4018/jitsa.2011070103

Chicago

Vrakas, Nikos, and Costas Lambrinoudakis. "A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services," International Journal of Information Technologies and Systems Approach (IJITSA) 4, no.2: 32-47. http://doi.org/10.4018/jitsa.2011070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The convergence of different network types under the same architecture offers the opportunity for low cost multimedia services. The main objective has been the high quality of the provided services. However, considering that older equipment with limited processing capabilities may be present in such environments, a tradeoff between security and service quality is inevitable. Specifically, low resource enabled devices cannot utilize state of the art security mechanisms, such as IPSec tunnels, integrity mechanisms, etc., and they simply employ HTTP Digest authentication. The lack of integrity mechanisms in particular raises many security concerns for the IMS infrastructures. Attacks such as Man in the Middle (MitM), spoofing, masquerading, and replay that can be launched in IMS environments, have been pinpointed in bibliography by various researchers. Moreover, an internal attacker may utilize his legitimate security tunnels in order to launch spoofing and identity theft attacks. This paper presents a cross-layer spoofing detection mechanism that protects SIP-based infrastructures from the majority of the aforementioned attacks without requiring an additional cryptographic scheme which would inevitably introduce considerable overheads.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.