Interoperation Key Schema for Social Media Tools in IP Multimedia Subsystem

IP Multimedia Subsystem (IMS) is now being a solution for packet switched networks. The future generation network is amalgamating the infrastructure of Wireless / wireline for providing the standard interface for Internet services. Nevertheless, the network infrastructures like multimedia and non-multimedia do not have any native mechanism to interpret the key schema of client media tools to establish the communication such as voice and data. To establish, as such services, a signaling protocol of Session Initiation Protocol (SIP) is being put to use to control the communication on Internet for establishing, Maintaining and terminating the communication session. Many papers have been proposed for authentication and authorization for securing the communication media. However, so far, no paper has been proposed for interpreting the built-in schema of multimedia tools. Thus we propose the Interoperation Key Schema to successfully exchange the mismatched schema between media client and server. Also we analyze the proposed mechanism with Internet security systems of Internet Protocol Security (IPSec) and Transport Layer Security (TLS). We deploy a real time platform of multimedia to examine the interoperation success rate and call setup time between the media clients.

[1]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[2]  Jari Arkko,et al.  Security Mechanism Agreement for SIP Sessions , 2003 .

[3]  Costas Lambrinoudakis,et al.  Survey of security vulnerabilities in session initiation protocol , 2006, IEEE Communications Surveys & Tutorials.

[4]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[5]  Chou Chen Yang,et al.  Secure authentication scheme for session initiation protocol , 2005, Comput. Secur..

[6]  Luca Veltri,et al.  SIP security issues: the SIP authentication procedure and its processing load , 2002 .

[7]  Ibrahim Sogukpinar,et al.  SIP Authentication Scheme using ECDH , 2007 .

[8]  David Pointcheval,et al.  Simple Password-Based Encrypted Key Exchange Protocols , 2005, CT-RSA.

[9]  Lawrence C. Stewart,et al.  HTTP Authentication: Basic and Digest Access Authentication , 1999 .

[10]  Jiann-Liang Chen,et al.  Advanced Path-Migration Mechanism for Enhancing Signaling Efficiency in IP Multimedia Subsystem , 2012, KSII Trans. Internet Inf. Syst..

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Russell J. Clark,et al.  Security issues with the IP multimedia subsystem (IMS) , 2007, MNCNA '07.

[13]  David Pointcheval,et al.  Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication , 2005, Financial Cryptography.

[14]  Sarvar Patel,et al.  Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.

[15]  Mohsen Toorani,et al.  A directly public verifiable signcryption scheme based on elliptic curves , 2009, 2009 IEEE Symposium on Computers and Communications.

[16]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[17]  Steven M. Bellovin,et al.  Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.

[18]  Hung-Min Sun,et al.  EFFICIENT AUTHENTICATION AND KEY AGREEMENT PROCEDURE IN IP MULTIMEDIA SUBSYSTEM FOR UMTS , 2011 .

[19]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[20]  Hassan M. Elkamchouchi,et al.  An efficient protocol for authenticated key agreement , 2011, 2011 28th National Radio Science Conference (NRSC).

[21]  Mohamed Boucadair,et al.  Enhancing the serviceability of IMS-based multimedia services: preventing core service failures , 2008, Int. J. Internet Protoc. Technol..

[22]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[23]  Mark Handley,et al.  SDP: Session Description Protocol , 1998, RFC.

[24]  Chun-Li Lin,et al.  A password authentication scheme with secure password updating , 2003, Comput. Secur..