Efficient identity-based authentication for IMS based services access

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The IP Multimedia Subsystem (IMS) is an access-independent, IP based service control architecture. Although, the security and data privacy aspects are very important in the IMS global objectives, they attract little attention so far. Secure access to multimedia services is based on SIP and HTTP digest on top of IMS architecture. Authentication is only based on SIP and is directly coupled to the SIP registration procedure. The third Generation Partnership Project (3GPP) provided Generic Bootstrapping Architecture (GBA) to authenticate the subscriber before accessing multimedia services over HTTP however through a heavy process. In this paper, we propose a new IMS Service Authentication scheme using Identity Based cryptography (IBC). Our solution enhances the security of the IMS authentication process and is promising in enabling new social services since it is based on the user's identity (which could be mapped to his presence). We analyzed the security of our new protocol and we began the evaluation of its performance. We obtained a better security as well as a performance gain compared to the classical service authentication approach in IMS.

Original languageEnglish
Title of host publicationMoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia
Pages260-266
Number of pages7
DOIs
Publication statusPublished - 1 Dec 2009
Externally publishedYes
Event7th International Conference on Advances in Mobile Computing and Multimedia, MoMM2009 - Kuala Lumpur, Malaysia
Duration: 14 Dec 200916 Dec 2009

Publication series

NameMoMM2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia

Conference

Conference7th International Conference on Advances in Mobile Computing and Multimedia, MoMM2009
Country/TerritoryMalaysia
CityKuala Lumpur
Period14/12/0916/12/09

Keywords

  • IP Multimedia Subsystem (IMS)
  • Identity Based cryptography (IBC)
  • Personalized access
  • Service authentication

Fingerprint

Dive into the research topics of 'Efficient identity-based authentication for IMS based services access'. Together they form a unique fingerprint.

Cite this