Multi-protocol authentication for SIP/SS7 mobile network
نویسندگان
چکیده
The communication paradigm has rapidly shifted from wireless mobile networks to All-Internet Protocol (IP) networks such as Multimedia Sub-system (IMS), Multi-Media Domain (MMD), and Worldwide Interoperability for Microwave Access (WiMAX), led by service industry leaders and communication manufacturers. This emerging communication paradigm is to provide new various services, such as ubiquitous multimedia services, with anyone, anytime, anyplace by using IP-based mobile devices. In this paradigm, providing authentication and session keys of a subscriber is a critical tasks because of the open accessibility and heterogeneousness of an All-IP network. In this paper, we develop a so-called Integrated Mobile Authentication Server (IMAS) that can securely inter-work among all mobile networks and fully support the legacy networks with backward compatibility. In designing IMAS, the mobile authentication interworking mechanism and other issues to be overcome are addressed. A test environment for IMAS is established, and performance results are analyzed and evaluated. It is demonstrated that IMAS works in an All-IP network without compensating the efficiency and functionalities of the legacy networks. 2008 Elsevier B.V. All rights reserved.
منابع مشابه
ملزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملSecuring SS7 Telecommunications Networks
Signaling System 7 (SS7) defines the network architecture, configuration and message transport protocol for Public Telephone Networks (PTNs). SS7 was originally designed for a closed telecommunications community, and therefore possesses limited authentication facilities. Deregulation coupled with PTN convergence with the Internet and wireless networks significantly increase vulnerabilities, ena...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملHysteretic Control Technique for Overload Problem Solution in Network of SIP Servers
This paper contains research and development results concerning application of hysteretic control principles to solve SIP servers overload problem, which is known from a number of IETF standards and scientific papers published over the past few years. The problem is that SIP protocol, being the application layer protocol, by default has no build-in means of overload control, as, for example, SS...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Communications
دوره 31 شماره
صفحات -
تاریخ انتشار 2008