SAS-IMS for Smart Mobile Security in IP Multimedia Subsystem

被引:4
作者
Bahnasse, Ayoub [1 ]
Talea, Mohamed [1 ]
Louhab, Fatima Ezzahraa [1 ]
Laafar, Sara [2 ]
Harbi, Adel [1 ]
Khiat, Azeddine [3 ]
机构
[1] Hassan II Univ, Fac Sci BEN MSIK, Lab LTI, Dept Phys, Casablanca, Morocco
[2] Cadi Ayyad Univ, Fac Sci & Technol, Lab LSET, Dept Phys, Marrakech, Morocco
[3] Hassan II Univ, Lab SSDIA, ENSET Mohammedia, Casablanca, Morocco
来源
2017 INTERNATIONAL CONFERENCE ON SMART DIGITAL ENVIRONMENT (ICSDE'17) | 2017年
关键词
IMS; NGN; IPsec; OpenIMS Core; Adaptive IPsec;
D O I
10.1145/3128128.3128134
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
IP Multimedia Subsystem (IMS) is a standardized Next Generation Network (NGN) architecture, used to provide users access to different services even in case of roaming. Although this architecture is deployed in cellular (mobile) networks, the latter represents several limitations, notably in terms of security. To overcome this inadequacy, IPsec protocol can be deployed between user equipment (UE) and Proxy Call Session Control Functions (P-CSCF). This solution has certain limitations in terms of reliability, i.e. the same security policy deployed between UE and P-CSCF will be applied to any type of the client traffic. In other words, if network performances are critical and the security policy deployed requires high processing, the transported traffic of real-time characteristic will suffer from a quality deterioration. In this work, we propose a new approach for the adaptive management of the IPsec protocol for IMS architectures, called Smart Adaptive Security for IMS, an acronym for SAS-IMS.
引用
收藏
页码:35 / 41
页数:7
相关论文
共 12 条
  • [1] [Anonymous], IETF STANDARDS
  • [2] [Anonymous], RFC4302
  • [3] Basavaraj Patil, 2016, U.S. Patent, Patent No. [9,408,078, 9408078]
  • [4] Chaitanya, 2014, International Journal of Future Computer and Communication, V3, P247, DOI 10.7763/IJFCC.2014.V3.305
  • [5] Dodd-Noble A., 2015, 7651 RFC
  • [6] FRANCIS William J., 2014, U.S. Patent, Patent No. [8,639,801, 8639801]
  • [7] Fu Z., 2011, POLICIES DISTRIBUTED, P39
  • [8] Hunter M.T, 2007, SECURITY ISSUES IP M
  • [9] QINGCHUAN Wang, 2014, NETWORK SECURITY TEC, V8, P019
  • [10] Slezak D., 2011, J SECURITY ENG, V8