The Third Generation Partnership Project (3GPP) Release 6 is an important step towards all-IP, next generation mobile networks. Compared to previous 3GPP networks, Release 6 defines the IP Multimedia Subsystem, a core network architecture completely based on IETF protocols. Among these protocols, the Session Initiation Protocol (SIP) is used for initiating, managing and terminating media sessions. Even though simple and flexible, SIP has not been defined with security in mind. Therefore, 3GPP technical specifications require SIP signaling to be protected by means of IPSec security associations. The use of SIP together with IPSec can result in a significant increase of both the amount of traffic exchanged and the computational load due to signaling inside the core network. This paper analyzes the computational overheads due to security for signaling in 3GPP Release 6 core networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
“Universal Mobile Telecommunications Systems (UMTS); IP Multimedia Sub- system (IMS); Stage 2,” TS 123.228 Version 6.12.0 (2005-12), ETSI, December 2005
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler, “SIP: Session Initiation Protocol,” RFC 3261, IETF, June 2002
P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko, “Diameter Base Protocol,” RFC 3588, IETF, September 2003
“3G Security, Network Domain Security (NDS), IP Network Layer Security,” TS 133.210, ETSI, 2005
C. Xenakis, N. Laoutaris, L. Merakos, and I. Stavrakakis, “A generic char- acterization of the overheads imposed by IPSec and associated cryptographic algorithms,” Computer Networks, vol. 50, pp. 3225-3241, December 2006
S. Kent,“IP Encapsulating Security Payload(ESP),” RFC 4303, IETF, December 2005
.“Data Encryption Standard (DES),” FIPS PUB 46-3, U.S. Federal Information Processing Standards Publication, 1999
“Advanced Encryption Standard (AES),” FIPS PUB 197, U.S. Federal Infor-mation Processing Standards Publication, 2001
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. CRC Press, October 1996. ISBN 0-8493-8523-7
“Secure Hash Standard,” FIPS PUB 180-1, U.S. Federal Information Processing Standards Publication, April 1995
H. Krawczyk, M. Bellare, and R. Canetti, “HMAC: Keyed-Hashing for Message Authentication,” RFC 2104, IETF, February 1997
R. Rivest, “The MD5 Message-Digest Algorithm,” RFC 1992, IETF, April 1992
“ITU-T Standard; Network Grade of Service Parameters and Target Values for Circuit-Switched Services in the Evolving ISDN,” ITU-T Recommendation E.721, ITU, May 1999
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this paper
Cite this paper
Tonesi, D.S., Tortelli, A., Salgarelli, L. (2007). Security Overheads for Signaling in Beyond-3G Networks. In: Pupolin, S. (eds) Wireless Communications 2007 CNIT Thyrrenian Symposium. Signals and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73825-3_12
Download citation
DOI: https://doi.org/10.1007/978-0-387-73825-3_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-73824-6
Online ISBN: 978-0-387-73825-3
eBook Packages: EngineeringEngineering (R0)