Security middleware for IMS-WLAN interworking
DOI:
https://doi.org/10.17533/udea.redin.14667Keywords:
authentication, confidentiality, IMS, integrity, interworking, security, WLANAbstract
The 3GPP proposes security architecture for Interworking WLAN-3GPP. However, it presents inefficiencies in the authentication procedure, which bring a greater consumption of radio resources, processing on the devices and delayed authentication. Due to previous reasons, we propose a security middleware that reduces the steps in the authentication of the WLAN-3GPP interworking and ensures the SIP signaling between the user equipment and the first entry point to the IMS network (P-CSCF).
Downloads
References
S. Muhammad, T. Magedanz. “3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model”. The Second International Conference on Availability, Realiability and Security. Vienna. 2007. pp. 198-205.
T. Wilder. “como estar seguro en un mundo IMS”.Revista auditoría y seguridad. Vol. 10. 2007. pp. 83-85.
3GPP TS 33.203. 3G security; Access security for IP based services. Ed. 3GPP, Valbonne (Francia). 2008. pp. 7-28.
IETF. HTTP Digest AKAv2. Ed. IETF, Fremont (USA). 2005. pp. 2-11.
D. Celentano, A. Fresa, M. Longer, A. L. “Robustelli. Improved authentication for ims registration in 3G/ WLAN interworking”. Personal, Indoor and Mobile Radio Communications. 2007. PIMRC 2007. IEEE 18th International Symposium on Publication. Vol. 3-7. 2007. pp. 1-5. DOI: https://doi.org/10.1109/PIMRC.2007.4394682
C. Ntantogian, C. Xenakis. “Reducing authentication traffic in 3G-WLAN integrated networks”. Personal, Indoor and Mobile Radio Communications 2007. PIMRC 2007. IEEE 18th International Symposium on. Vol. 3-7. 2007. pp. 1-5. DOI: https://doi.org/10.1109/PIMRC.2007.4394508
C. Ntantogian, I. Stavrakakis, C. Xenakis. “Reducing the User Authentication Cost in NextGeneration Networks”. Wireless on Demand Network Systems and Services. 2008. pp. 65-72. WONS 2008.IEEE Fifth Annual Conference on Publication. Garmisch- Partenkirchen (Alemania). Vol. 23-25. 2008. DOI: https://doi.org/10.1109/WONS.2008.4459356
L. Veltri, S. Salsano, G. Martiniello. “Wireless LAN- 3G Integration: Unified Mechanisms for Secure Authentication based on SIP”. Communications, 2006. ICC ‘06. IEEE International Conference. Vol. 5. 2006. pp. 2219-2224. DOI: https://doi.org/10.1109/ICC.2006.255100
3GPP TS 33.234. 3G Security. Wireless Local Area Network (WLAN) Interworking security Release. Vol. 8. 2008. pp. 9-58.
IETF. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). RFC 4187. Ed. IETF, Fremont (USA). 2006. pp. 4-30.
IETF. PPP Extensible Authentication Protocol (EAP). RFC 2284. Ed. IETF, Fremont (USA). 1998. pp. 2-12.
IETF. Internet Key Exchange (IKEv2) Protocol. RFC 4306. Ed. IETF, Fremont (USA). 2005. pp. 3-27.
3GPP TR 22.934. Feasibility study on 3GPP system to Wireless Local Area Network (WLAN) Interworking. Vol. 7. 2007. pp. 42-53.
C. C. Yang, K. H. Chu, Y. W. Yang. “3G and WLAN Interworking Security: Current Status and Key Issues”. International Journal of Network Security. Vol. 2. 2006. pp. 1-13.
3GPP TS 35.206. Specification of the MILENAGE algorithm set. Ed. 3GPP, Valbonne (Francia). 2008. pp. 6-12.
IETF. IP Encapsulating Security Payload (ESP). IETF. RFC 2406. Ed. IETF, Fremont (USA). 1998. pp. 3-17.
https://jain-sip.dev.java.net. Consultada el 30 de Marzo de 2009.
http://ipsec-tools.sourceforge.net/. Consultada el 30 de Marzo de 2009.
http://www.netfilter.org/projects/iptables/index.html. Consultada el 30 de Marzo de 2009.
http://netbsd.gw.com/cgi-bin/man-cgi?racoon++NetBSD-current. Consultada el 30 de Marzo de 2009.
http://www.openimscore.org/. Consultada el 30 de Marzo de 2009.
http://www.bind9.net/. Consultada el 30 de Marzo de 2009.
P. Herzog. OSSTMM - Manual de la Metodología Abierta de Testeo de Seguridad. Ed. Universidad del Cauca. Popayán. 2008. pp. 31-85.
http://www.wireshark.org. Consultada 30 de Marzo de 2009.
http://www.tamos.com/products/commwifi/. Consultada el 30 de Marzo de 2009. 26. IETF. SIP: Session Initiation Protocol. IETF RFC 3261. Ed. IETF, Fremont (USA). 2002. pp. 264.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 Revista Facultad de Ingeniería

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Revista Facultad de Ingeniería, Universidad de Antioquia is licensed under the Creative Commons Attribution BY-NC-SA 4.0 license. https://creativecommons.org/licenses/by-nc-sa/4.0/deed.en
You are free to:
Share — copy and redistribute the material in any medium or format
Adapt — remix, transform, and build upon the material
Under the following terms:
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
The material published in the journal can be distributed, copied and exhibited by third parties if the respective credits are given to the journal. No commercial benefit can be obtained and derivative works must be under the same license terms as the original work.