首页> 外文期刊>Multimedia Tools and Applications >Analyzing secure key authentication and key agreement protocol for promising features of IP multimedia subsystem using IP multimedia server-client systems
【24h】

Analyzing secure key authentication and key agreement protocol for promising features of IP multimedia subsystem using IP multimedia server-client systems

机译:使用IP多媒体服务器-客户端系统分析安全密钥认证和密钥协议协议,以了解IP多媒体子系统的有前途的功能

获取原文
获取原文并翻译 | 示例
       

摘要

Recently, Session Initiation Protocol (SIP) has become a prime signaling protocol for the multimedia communication systems, though none of the researchers have analyzed its promising features, namely access independence, authentication scheme verification, AKA (Authentication and Key Agreement) security properties, 3GPP security properties, signal congestion, bandwidth consumption and computation overhead using the physical multimedia server-client platform. To examine the issues realistically, the existing authentication schemes, such as UMTS AKA, EPS AKA, Cocktail AKA, S AKA, HL AKA and ZZ AKA were designed and developed in the multimedia server-client systems deployed on Linux platform. The cross-examination revealed that the existing schemes failed to satisfy the IMS (IP Multimedia Subsystem) promising features, like mutual authentication, session-key sharing, (perfect) forward secrecy and implicit-key authentication. Thus, this paper proposes a Secure-Key Authentication and Key Agreement protocol (SK AKA) to meet out the standard demands of IMS. To curtail its authentication steps, the secure authentication vector S (AV) computes and dispenses the generated vectors between the multimedia server-client systems in advance, through the serving call session control function S (CSCF) . As a result, the execution steps of UMTS AKA are annulled for the sake of accomplishment of the IMS features. In addition, the protocol of SK AKA integrates the strategies of Context Identity C (ID) and Elliptic Curve - Diffie Hellman (EC-DH) to resist most of the potential attacks like SIP flooding, forgery, man-in-the-middle, password guessing and key impersonation. To analyze the parameters, such as (SIP) Flooding Attack Detection Rate, End-To-End Delay of Multiple Voice Call Session, Call Success Rate, SIP Utilization, RTP Utilization, Call Response Time, Bandwidth Consumption and Signalling Congestion realistically, the proposed and existing authentication schemes have been coded and integrated in the real-time IMS client-server system. Above all, the thoroughgoing research has revealed that the proposed protocol of SK AKA accomplishes all the IMS challenges: 1. Adhere the promising features of IMS; 2. Attack resiliency; and 3. Fulfill the promising parameters of IMS, in comparison with the other existing schemes.
机译:最近,会话发起协议(SIP)已成为多媒体通信系统的主要信令协议,尽管没有研究人员分析其有前途的功能,即访问独立性,身份验证方案验证,AKA(身份验证和密钥协商)安全属性,3GPP。使用物理多媒体服务器-客户端平台的安全性,信号拥塞,带宽消耗和计算开销。为了现实地研究这些问题,在Linux平台上部署的多媒体服务器-客户端系统中设计并开发了现有的身份验证方案,例如UMTS AKA,EPS AKA,Cocktail AKA,S AKA,HL AKA和ZZ AKA。盘问表明,现有方案无法满足IMS(IP多媒体子系统)的有前途的功能,例如相互认证,会话密钥共享,(完全)前向保密和隐式密钥认证。因此,本文提出了一种安全密钥认证和密钥协商协议(SK AKA),以满足IMS的标准要求。为了减少其认证步骤,安全认证向量S(AV)通过服务呼叫会话控制功能S(CSCF)预先在多媒体服务器-客户端系统之间计算并分配生成的向量。结果,为了完成IMS功能,取消了UMTS AKA的执行步骤。此外,SK AKA的协议整合了Context Identity C(ID)和Elliptic Curve-Diffie Hellman(EC-DH)的策略,可抵御大多数潜在的攻击,例如SIP泛洪,伪造,中间人攻击,密码猜测和密钥模拟。为了实际分析(SIP)泛洪攻击检测率,多个语音呼叫会话的端到端延迟,呼叫成功率,SIP使用率,RTP使用率,呼叫响应时间,带宽消耗和信令拥塞等参数,提出了现有的身份验证方案已被编码并集成在实时IMS客户端-服务器系统中。最重要的是,经过深入的研究表明,提出的SK AKA协议可以解决IMS的所有挑战:1.坚持IMS的有前途的功能; 2.攻击弹性; 3.与其他现有方案相比,实现了有希望的IMS参数。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号