Abstract
The IMS (IP Multimedia Subsystem) architecture is the key control for next generation networks (NGN). IMS gives network operators the opportunity to extend their services, including voice and multimedia communications and deliver them in new environments with new goals. Its security is paramount, especially authentication. In IMS, authentication is divided into two phases a PS (Packet-Switch) domain-level with the 3GPP-AKA protocol, and a second at IMS level using the IMS-AKA protocol. The latter is based on 3GPP-AKA, which leads to a large duplication of steps between the two phases. Some Works have tried to reduce this duplication and increase the IMS-AKA efficiency, but they add new vulnerabilities to IMS-AKA. The aim of this paper is to solve the security problems of IMS-AKA while maintaining good efficiency.
Chapter PDF
Similar content being viewed by others
References
Camarillo, G.: Introduction to TISPAN NGN. Ericsson, Tech. Rep. (2005)
Tadault, M., Soormally, S., Thiebault, L.: Network evolution towards IP multimedia subsystem. Alcatel, Tech. Rep. (2003), http://www.alcatel.com/doctypes/articlepaperlibrary/pdf/ATR2003Q4/T0312-IP-Multimedia-EN.pdf
3GPP TS 33.102: Security architecture. V8.4.0 2009-10
3GPP TS 33.105: Cryptographic algorithm requirements. s.l. : ETSI, 2009-02. vol. 8
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Spark, R., Handley, M., Schooler, E.: Session Initiation Protocol. RFC 3261 (June 2002)
Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter Base Protocol RFC 3588 IETF (2003)
3GPP TS 29.228. Technical Specification Core Network; IP Multimedia Subsystem Cx and Dx Interfaces; Signaling Flows and Message Contents (Release 5)
3GPP TS 29.229. Technical Specification Core Network; Cx and Dx Interfaces Based on the Diameter Protocol; Protocol Details
Lin, Y.-B., Chang, M.-F., Hsu, M.-T., Wu, L.-Y.: One-pass GPRS and IMS authentication procedure for UMTS. IEEE Journal on Selected Areas in Communications 23(6), 1233–1239 (2005)
3GPP TS 33.203: Access security for IP-based services. V8.6.0 s.l. : ETSI, 2009-07
3GPP TS 33.210: 3G security; Network Domain Security (NDS); IP network layer security. V8.3.0 s.l.: ETSI, 2009-07
Kent, S., Atkinson, R.: IP Encapsulating Security Payload (ESP). RFC 2406, Internet Engineering Task Force (November 1998)
Kent, S.: IP Encapsulating Security Payload (ESP). RFC 4303, Internet Engineering Task Force (December 2005)
One-Pass Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS. Chung-Ming, Huang y Jian-Wei, Li. s.l.: IEEE (2007)
Frankel, S., Glenn, R., Kelly, S.: The aes-cbc cipher algorithm and its use with ipsec, ietf, rfc3602 (2003)
Madson, C., Glenn, R.: The use of hmac-sha-1 within esp and ah. ietf, rfc2404 (1998)
Rescorla. Diffie-Hellman Key Agreement Method. RFC 2631 (June 1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Maachaoui, M., Abou El Kalam, A., Fraboul, C. (2011). A Secure One-Way Authentication Protocol in IMS Context. In: De Decker, B., Lapon, J., Naessens, V., Uhl, A. (eds) Communications and Multimedia Security. CMS 2011. Lecture Notes in Computer Science, vol 7025. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24712-5_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-24712-5_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24711-8
Online ISBN: 978-3-642-24712-5
eBook Packages: Computer ScienceComputer Science (R0)