Security and Accounting Enhancements for Roaming in IMS
نویسنده
چکیده
As the multimedia services are gaining popularity, the operators are seeking new architectures, such as IP Multimedia Subsystem (IMS), that would allow provision of these services with sufficient level of quality and security. In the future, however, it is not anymore so clear who is an operator, because the ubiquitous communication visions enables every player to interact in multitude of ways with other entities and provide services of their own. In this paper we investigate a setting, where a roaming subscriber wishes to receive service from an operator, who has no previous relationship with the home operator. We propose methods based on cryptographic identities which enable the each party to get assurance about the authenticity of each participant and the accountability of the executed actions. While suggesting completely new mechanisms for existing systems, the proposal also addresses the needs to leverage the available infrastructures in a convenient way.
منابع مشابه
ملزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملInternet - Draft SIP and SAML roaming profile
Roaming services allow users that have a contract with a voice service provider to use access resources owned by other providers known as internet access providers. This draft proposes a tokenbased Authentication, Authorization, Accounting (AAA) and billing model for roaming users. It also introduces a protocol solution for the proposed model that is based on the Assertion Markup Language (SAML...
متن کاملInternet - Draft AAA and billing of Roaming Users
Roaming services allow users that have a contract with a voice service provider to use access resources owned by other providers known as internet access providers. This draft proposes a tokenbased Authentication, Authorization, Accounting (AAA) and billing model for roaming users supporting the Session Initiation Protocol (SIP). It also introduces a protocol solution for the proposed model tha...
متن کاملEfficient Authenticated Wireless Roaming via Tunnels
Wireless roaming means that a mobile device is able to switch from one network cell to another while keeping the link to active services. Recent researches [12] showed that it increases the security to establish an authenticated and confidential tunnel directly to a home network which then acts as service provider respectively proxy server for further external services. In this paper we extend ...
متن کاملSecure Architectures for Wireless LANs in the Enterprise
Because of enhanced mobility and productivity, wireless local area networks (WLANs) are experiencing a period of substantial growth in the marketplace. When implemented correctly, WLANs provide secure, transparent access between Ethernet-wired networks and radio-equipped Mobile Units. Nortel Networks offers several security solutions to enhance the security of WLANs— enabling full site-to-site ...
متن کامل