Skip to main content

Securing Real-Time Sessions in an IMS-Based Architecture

  • Conference paper
E-business and Telecommunications (ICETE 2007)

Abstract

The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going to be suffered by mobile users in the years to come. While a great deal of research activity, together with standardisation efforts and experimentations, is carried out on mechanisms for signalling protection, very few integrated frameworks for real-time multimedia data protection have been proposed in a context of IP Multimedia Subsystem, and even fewer experimental results based on testbeds are available. In this paper, after a general overview of the security issues arising in an advanced IP Multimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic context transfer, and allowing the setup of Secure Real-Time Protocol sessions is presented; finally, experimental results are provided together with quantitative assessments and comparisons of system performances for audio sessions with and without the adoption of the Secure Real-Time Protocol framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rosenberg, J.D., et al.: Session Initiation Protocol (SIP) IETF RFC 3261(2002), http://www.ietf.org/rfc/rfc3261.txt

  2. Schulzrinne, H., et al.: RTP: A transport protocol for real-time applications, IETF RFC 3550 (2003), http://www.ietf.org/rfc/rfc3550.txt

  3. Baugher, M., et al.: The secure real-time transport protocol (SRTP), IETF RFC 3711 (2004), http://www.ietf.org/rfc/rfc3711.txt

  4. 3GPP, The 3rd Generation Partnership Project (1998), http://www.3gpp.org/

  5. Thayer, M., et al.: IP security document roadmap, IETF RFC 2411 (1998), http://www.ietf.org/rfc/rfc2411.txt

  6. Dierks, T., Allen, C.: The TLS protocol, IETF RFC 2246 (1999), http://www.ietf.org/rfc/rfc2246.txt

  7. Franks, J., et al.: HTTP authentication: Basic and digest access authentication, IETF RFC 2617 (1999), http://www.ietf.org/rfc/rfc2617.txt

  8. Koien, G.M.: An evolved UMTS network domain security architecture. Technical report, R&D Telenor (2002)

    Google Scholar 

  9. Schaad, J., Housley, R.: Advanced encryption standard (AES) key wrap algorithm, IETF RFC 3394 (2002), http://www.ietf.org/rfc/rfc3394.txt

  10. Stallings, W.: Data and Computer Communications, 7th edn. Prentice-Hall, Englewood Cliffs (2004)

    MATH  Google Scholar 

  11. Blom, R., Carrara, E., Lindholm, F., Norman, K., Naslund, M.: Conversational IP multimedia security. In: Proc. 4th IEEE MWCN 2002, pp. 147–151 (2002)

    Google Scholar 

  12. Ranganathan, M.K., Kilmartin, L.: Investigations into the impact of key exchange mechanisms for security protocols in VoIP networks. In: Proc. First Joint IEI/IEE Symposium on Telecommunications Systems Research (2001), http://telecoms.eeng.dcu.ie/symposium/papers/D2.pdf

  13. Vaidya, B., Kim, J., Pyun, J., Park, J., Han, S.: Performance analysis of audio streaming in secure wireless access network. In: Proc. 4th IEEE ACIS 2005, pp. 556–561 (2005)

    Google Scholar 

  14. Arkko, J., et al.: MIKEY: Multimedia internet keying, IETF RFC 3830 (2004), http://www.ietf.org/rfc/rfc3830.txt

  15. Arkko, J., et al.: Key management extension for session description protocol (SDP) and real time streaming protocol (RTSP), IETF RFC 4567 (2006), http://www.ietf.org/rfc/rfc4567.txt

  16. Senatore, A., Fresa, A., Robustelli, A.L., Longo, M.: A security architecture for access to the IP multimedia subsystem in B3G networks. In: Proc. 7th WPMC 2004 (2004)

    Google Scholar 

  17. AKA: Authentication and key agreement (2003) 3GPP TS 33.102 version 6.0.0

    Google Scholar 

  18. Handley, M., Jacobson, V.: SDP: Session description protocol, IETF RFC 2327 (1998), http://www.ietf.org/rfc/rfc2327.txt

  19. Robust Audio Tool (RAT) (2004), http://www-mice.cs.ucl.ac.uk/multimedia/software/rat/

  20. Bellamy, J.: Digital Telephony, 3rd edn. Wiley, Chichester (2000)

    Google Scholar 

  21. Jiang, W., Koguchi, K., Schulzrinne, H.: QoS evaluation of VoIP end-points. In: Proc. IEEE ICC 2003, vol. 3, pp. 1917–1921 (2003)

    Google Scholar 

  22. Beerends, J., Hekstra, A.P., Rix, A.W., Hollier, M.P.: Perceptual evaluation of speech quality (PESQ), the new ITU standard for end-to-end speech quality assessment, part I & II. 50, 755–778 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cennamo, P., Fresa, A., Longo, M., Postiglione, F., Robustelli, A.L., Toro, F. (2008). Securing Real-Time Sessions in an IMS-Based Architecture. In: Filipe, J., Obaidat, M.S. (eds) E-business and Telecommunications. ICETE 2007. Communications in Computer and Information Science, vol 23. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88653-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88653-2_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88652-5

  • Online ISBN: 978-3-540-88653-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics