Securing the IP Multimedia Subsystem with IPsec and HTTP Digest
Keywords:
Internet Protocol Multimedia Subsystem (IMS), Internet Protocol Security (IPsec), HTTP.Abstract
Modern Telecommunication networks were combined from two communications: cellular networks and the Internet. The Internet Protocol Multimedia Subsystem (IMS) is the key element in the Modern Telecommunication networks architecture that makes it possible to provide wide range cellular access to all the services that the Internet provides. So, IMS is a great achievement in the communication world with advantage to maintain single communication platform for all but the big challenge is to maintain an adequate security level in this different network environment. IMS is based principally on IP protocol. Therefore, it inherits the security issues of IP networks. The IMS architecture is open, distributed and it has the advantage of being flexible in its implementation and deployment. This generates a variety of communication interfaces, which can make the system very vulnerable to attack. Add to that, the services offered on the IMS network must be provided by ensuring confidentiality and respect the privacy of users. Therefore, it is necessary to secure the IMS network at every level of its architecture including the final customer or subscriber device. Solutions like firewalls, anti-spy ware and antivirus systems failed to counter the emerging threats because they only target specific types of threats. In this study we are proposing security approach which is a Combination model composed of two protocols IPsec and HTTP digest.
References
Travis Russell. The IP Multimedia Subsystem ( Session Control & Other Network Operations ). New York Chicago San Francisco: McGraw-Hill Companies, 2008, PP 19-178.
Chi-Yuan Chen, Tin-Yu Wu.“An efficient end-to-end security mechanism for IP”, Computer Communication,vol 3,pp 4259–4268, 2008.
Chalamalsetty K.“Architecture for IMS Security to Mobile: Focusing on Artificial Immune System and Mobile Agents Integration”, Master Thesis Computer Science Thesis no: MCS-2009:24, 2009.
E.Belmekkia, B.Raouyane. “Towards a New Approach for Securing IMS Networks”, Networks Labotatory, Institut nationale de Poste et Telecommunication, vol 4, pp 138 – 146, 2013
Gonzalo Camarillo and Miguel A. Garcia-Martin. The 3G IP Multimedia Subsystem ( IMS ) Merging the Internet and the cellular worlds. Chichester, England: John Wiley & Sons, 2006, pp 213-229.
Gelogo, D. S.” Securing IP Multimedia Subsystem with the appropriate Security Gateway and IPSec Tunneling”. Journal of Security Engineering, vol 8, 2011, pp 306-791.
Kai Shuang, Siyuan Wang.” IMS Security Analysis using Multi-attribute Model”. JOURNAL OF NETWORKS, VOL. 6 NO. 2, 2011
Dong Wang and Chen Liu, "Model-based Vulnerability Analysis of IMS Network", Journal of Networks, vol. 4, no.4, June 2009.ETSI TS 102 165-1 V4.2.3, 2011-03
Michail Tsag karo, T. D. ”Securing IP multimedia subsystem: (IMS) infrastructures: protection against attacks”. FITCE Congress., Session 07, Paper 05, 2008.
Downloads
Published
How to Cite
Issue
Section
License
Authors who submit papers with this journal agree to the following terms.