Performance evaluation of an authentication solution for IMS services access

The IP Multimedia Subsystem (IMS) is an access-independent, IP based, service control architecture. Users’ authentication to the IMS takes place through the AKA (Authentication and Key Agreement) protocol, while Generic Bootstrapping Architecture (GBA) is used to authenticate users before accessing the multimedia services over HTTP. In this paper, we focus on the performance analysis of an IMS Service Authentication solution that we proposed and that employs the Identity Based Cryptography (IBC) to personalize each user access. We carry out the implementation of this solution on top of an emulated IMS architecture and evaluate its performance through different clients’ access scenarios. Performance results indicate that increase in the number of clients does not influence the average processing time and the average consumed resources of the GBA entities during the authentication. We also notice that the Bootstrapping Server Function (BSF) presents a bottleneck during the service authentication which helps in giving some guidelines for the GBA entities deployment.

[1]  廖宏梓,et al.  On the Elliptic Curve Digital Signature Algorithm , 2006 .

[2]  Yuqing Zhang,et al.  A new provably secure authentication and key agreement protocol for SIP using ECC , 2009, Comput. Stand. Interfaces.

[3]  Tony Mason,et al.  Lex & Yacc , 1992 .

[4]  Jari Arkko,et al.  Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) , 2002, RFC.

[5]  Muhammad Sher,et al.  Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks , 2006, Q2SWinet '06.

[6]  Chung-Ming Huang,et al.  One-Pass Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).

[7]  Ernest Foo,et al.  A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography , 2006 .

[8]  Luo Hong JAVA Security Architecture , 2000 .

[9]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[10]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[11]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[12]  Mohamed Abid,et al.  Efficient identity-based authentication for IMS based services access , 2009, MoMM.

[13]  Gonzalo Camarillo,et al.  The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds, Second Edition , 2006 .

[14]  Valtteri Niemi,et al.  Generic Authentication Architecture , 2008 .

[15]  Miguel A. Garcia-Martin,et al.  The 3G IP multimedia subsystem IMS - merging the internet and the cellular worlds (2. ed.) , 2006 .

[16]  Gonzalo Camarillo,et al.  The 3G IP Multimedia Subsystem : Merging the Internet and the Cellular Worlds , 2004 .