Warianty tytułu
Security in the IP Multimedia Subsystem
Języki publikacji
Abstrakty
Przedstawiono podstawowe aspekty bezpieczeństwa architektury IP Multimedia Subsystem. Omówiono zagrożenia, najważniejsze środki ochrony obejmujące protokoły IPSec i Diameter, a także sposoby zapewnienia bezpieczeństwa zarówno na poziomie sieci dostępowej, jak i wewnątrz domeny sieci.
The article gives a brief overview of the basic aspects of security of the IP Multimedia Subsystem architecture. Examples of security threads are followed by a sketch of fundamental protection means, including the IPSec and Diameter protocols. Access network security as well as intra domain security are also discussed.
Rocznik
Tom
Strony
576-582
Opis fizyczny
Bibliogr. 26 poz., rys., tab.
Twórcy
Bibliografia
- [1] Wolisz W, Gałka P: Wprowadzenie do architektury IP Multimedia Subsystem, Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 12/2009
- [2] Molisz W, Gałka P: Usługi IP Multimedia Subsystem, Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, nr 2-3/2011
- [3] 3GPP TS 33.203, 3G security; Access security for IP-based services, Release 9, 09-2009; http://www.3gpp.org/ftp/Specs/rrtrnl-info/33203.htm
- [4] 3GPP TS 33.210, 3G security; Network Domain Security (NOS); IP network layer security, Release 9, 06-2010; http://www.3gpp.org/ftp/Specs/html-info/33210.htm
- [5] Kent S.: IP Encapsulating Security Payload (ESP), RFC 2406, December 2005; http://tools.ietf.org/ntml/rfc2406
- [6] Maughan D., Schertler M., Schneider M., Tumer J.: Internet Security Association and Key Management Protocol (ISAKMP), RFC 2408, November 1998, http://tools.ietf.org/ritml/rfc2408
- [7] Frankel S., Glenn S., Kelly S.: The AES-CBC Cipher Algorithm and Its Use with IPsec, RFC 3602, September 2003; http://www.ietf.org/rfc/rfc3602
- [8] Glenn R., Kent S.: The NULL Encryption Algorithm and Its Use With IPsec, RFC 2410, November2010; http://tools.ietf.org/html/rfc2410
- [9] Kent S.: IP Authentication Header, RFC 4302, December 2005; http://tools.ietf.org/html/rfc4302
- [10] Calhoun R, Loughney J., Guttman E., Zom G., Arkko J.: Diameter Base Protocol, RFC 3588, September 2003; http://tools.ietf.org/html/rfc3588
- [11] RigneyC., WillensS., RubensA., Simpson W:Remote Authentication Dial In User Service, RFC 2865, June 2000; http://tools.ietf.org/html/rfc2865
- [12] Rosenberg J., Schulzrinne H., Camarillo G., Johnston A., Peterson J., Sparks R., Handley M., Schooler E.: S/P: Session Initiation Protocol, RFC 3261, June 2002; http://tools.ietf.org/html/rfc3261
- [13] Porter T: Practical VoIP Security, Syngress Publishing, 2006
- [14] 3GPP TR 33.978, Security aspects of early IP Multimedia Subsystem (IMS), Release 8, 12-2008; http://www.3gpp.org/ftp/Specs/html-info/33978.htm
- [15] Perkins C.: IPMobilitySupportforlPv4, Revised, RFC5944, November 2010; http://tools.ietf.org/html/rfc5944
- [16] Kent S., Atkinson R.: Security Architecture for the Internet Protocol, RFC 2401, Nwember 1998; http://tools.ietf.org/html/rfc2401
- [17] Sharma Madhu J., Leung Victor C.M.: Imrpoved IP Multimedia Subsystem Authentication Mechanism for 3G-WLAN Networks; Computer Communication Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on 10-15 April 2011
- [18] Rafique M. Zubair, Khan Zeeshan Shafi, Khan Muhammad Khurram, Alghatbar Khaled: Securing IP-Multimedia Subsystem (IMS) Against Anomalous Message Exploits by using Machine Learning Algorithms; Information Technology: New Generations (ITNG), 2011 Eight International Conference on 11 -13 April 2011
- [19] Rivest R.: The MD5Message-DigestAlgorithm, RFC1321, April 1992; http:/Acols.ietf.org/html/rfc1321
- [20] Ehrsam W. F., Meyer C. H. W., Smith J. L., Tuchman W. L.: Message verification and transmission error detection by block chaining, US Patent 4074066, 1976
- [21] Federal Information Processing Standards Publication 197: Specification for the Advanced Encryption Standard (AES), November 26,2001
- [22] Federal Information Processing Standards Publication 46-3: Data Encryption Standard, October 25,1999
- [23] Federal Information Processing Standards Publication 180-1: Secure Hash Standard, April 17,1995
- [24] Krawczyk H., Bellare M., Canetti R.: HMAC: Keyed-Hashing for Message Authentication, RFC 2104, February 1997; http://tools.ietf.org/html/rfc2104
- [25] Stokłosa J., Bilski T, Pankowski I: Bezpieczeństwo danych w systemach informatycznych, Wydawnictwo Naukowe PWN, Warszawa-Poznań 2001
- [26] Infonetics Research, IMS market up 87% year-over-year; GENBAND leads combined carrier VolP and IMS market; Campbell, California, August 22, 2011; http://www.infonetics.com/pr/2011/2Q11-Service-Provider-VolP-and-IMS-Market-Highlights.asp
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.baztech-article-BPG8-0075-0011