A General IMS Registration Protocol for Wireless Networks Interworking

One of the most critical tasks when accessing services through the IP Multimedia Subsystem is the registration process. The process involves two registrations, the first with the access network, the second with IMS. This leads to an overhead authentication that introduces a big delay. This article proposes an improvement for IMS registration protocol able to relate IMS registration to an access network registration by cryptographically binding both of them. This approach provides a general solution, saves time during registration and avoids several attacks.

[1]  Eric Rescorla Keying Material Exporters for Transport Layer Security (TLS) , 2010, RFC.

[2]  Luca Veltri,et al.  Wireless LAN-3G Integration: Unified Mechanisms for Secure Authentication based on SIP , 2006, 2006 IEEE International Conference on Communications.

[3]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[4]  LinYi-Bing,et al.  One-pass GPRS and IMS authentication procedure for UMTS , 2006 .

[5]  Bongkyo Moon,et al.  Enhanced SIP for Reducing IMS Delay under WiFi-to-UMTS Handover Scenario , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.

[6]  Jon Peterson,et al.  Session Initiation Protocol (SIP) Authenticated Identity Body (AIB) Format , 2004, RFC.

[7]  N. Movahhedinia,et al.  Transmission Delay Reduction in IMS by Re-registration Procedure Modification , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.

[8]  Antonio Fresa,et al.  Improved Authentication for IMS Registration in 3G/WLAN Interworking , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[9]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[10]  Valtteri Niemi,et al.  Man-in-the-Middle in Tunneled Authentication Protocols , 2002 .

[11]  Jose Puthenkulam,et al.  The Compound Authentication Binding Problem , 2003 .

[12]  Yoshihiro Ohba PANA over TLS , 2002 .

[13]  Lawrence C. Stewart,et al.  HTTP Authentication: Basic and Digest Access Authentication , 1999 .

[14]  Valtteri Niemi,et al.  Man-in-the-Middle in Tunnelled Authentication Protocols , 2003, Security Protocols Workshop.

[15]  Yi-Bing Lin,et al.  One-pass GPRS and IMS authentication procedure for UMTS , 2005, IEEE Journal on Selected Areas in Communications.