通过4G GAA架构对IMS进行安全的应用程序访问

Cristina-Elena Vintila
{"title":"通过4G GAA架构对IMS进行安全的应用程序访问","authors":"Cristina-Elena Vintila","doi":"10.1109/WORLDCIS17046.2011.5749848","DOIUrl":null,"url":null,"abstract":"The entire telecommunications and services world has focused its attention on the newest 3GPP architecture, 4G. Proposing high speed data transfer, all flat-IP network for the core systems and stronger authentication and AAA methods, this architecture seems to be the answer for the mobile networks of the future. Another architecture described by 3GPP as well, but based on IETF standards is the IMS architecture. This is focused on mobile services, mainly VoIP, but also presence, push-to-talk, location and multimedia and broadcast services. The IMS core network has its own security mechanisms, which are constantly tested and improved. Looking in the perspective, the user equipment, specially the one found in roaming has to do a lot of signaling in order to authenticate to both networks and use the services available for it in a secure manner. From the provider's point of view, the issue is even more complicated, because it has to secure its network, securely interoperate with other networks, be able to obtain granular charging information and also provide lawful interception capabilities for the government institutions. This paper reviews the authentication security architecture available in 3GPP for providing secure access to application services, with emphasis on the interaction of 4G and IMS components, being the first step in a larger 4G-IMS interaction study with regards to security.","PeriodicalId":204568,"journal":{"name":"2011 World Congress on Internet Security (WorldCIS-2011)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure application access to IMS via 4G GAA architecture\",\"authors\":\"Cristina-Elena Vintila\",\"doi\":\"10.1109/WORLDCIS17046.2011.5749848\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The entire telecommunications and services world has focused its attention on the newest 3GPP architecture, 4G. Proposing high speed data transfer, all flat-IP network for the core systems and stronger authentication and AAA methods, this architecture seems to be the answer for the mobile networks of the future. Another architecture described by 3GPP as well, but based on IETF standards is the IMS architecture. This is focused on mobile services, mainly VoIP, but also presence, push-to-talk, location and multimedia and broadcast services. The IMS core network has its own security mechanisms, which are constantly tested and improved. Looking in the perspective, the user equipment, specially the one found in roaming has to do a lot of signaling in order to authenticate to both networks and use the services available for it in a secure manner. From the provider's point of view, the issue is even more complicated, because it has to secure its network, securely interoperate with other networks, be able to obtain granular charging information and also provide lawful interception capabilities for the government institutions. This paper reviews the authentication security architecture available in 3GPP for providing secure access to application services, with emphasis on the interaction of 4G and IMS components, being the first step in a larger 4G-IMS interaction study with regards to security.\",\"PeriodicalId\":204568,\"journal\":{\"name\":\"2011 World Congress on Internet Security (WorldCIS-2011)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-04-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 World Congress on Internet Security (WorldCIS-2011)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WORLDCIS17046.2011.5749848\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 World Congress on Internet Security (WorldCIS-2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WORLDCIS17046.2011.5749848","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

整个电信和服务行业都将注意力集中在最新的3GPP架构——4G上。该架构提出了高速数据传输、核心系统的全平面ip网络以及更强的身份验证和AAA方法,似乎是未来移动网络的答案。3GPP描述的另一种体系结构是IMS体系结构,但基于IETF标准。这主要集中在移动服务上,主要是VoIP,但也包括现场通话、一键通、定位、多媒体和广播服务。IMS核心网有自己的安全机制,这些机制在不断地测试和改进。从这个角度来看,用户设备,特别是漫游设备,必须做大量的信令,以便对两个网络进行身份验证,并以安全的方式使用可用的服务。从提供商的角度来看,这个问题更加复杂,因为它必须保护自己的网络,安全地与其他网络互操作,能够获得细粒度的收费信息,并为政府机构提供合法的拦截能力。本文回顾了3GPP中可用的身份验证安全架构,以提供对应用服务的安全访问,重点介绍了4G和IMS组件的交互,这是更大的4G-IMS交互安全性研究的第一步。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Secure application access to IMS via 4G GAA architecture
The entire telecommunications and services world has focused its attention on the newest 3GPP architecture, 4G. Proposing high speed data transfer, all flat-IP network for the core systems and stronger authentication and AAA methods, this architecture seems to be the answer for the mobile networks of the future. Another architecture described by 3GPP as well, but based on IETF standards is the IMS architecture. This is focused on mobile services, mainly VoIP, but also presence, push-to-talk, location and multimedia and broadcast services. The IMS core network has its own security mechanisms, which are constantly tested and improved. Looking in the perspective, the user equipment, specially the one found in roaming has to do a lot of signaling in order to authenticate to both networks and use the services available for it in a secure manner. From the provider's point of view, the issue is even more complicated, because it has to secure its network, securely interoperate with other networks, be able to obtain granular charging information and also provide lawful interception capabilities for the government institutions. This paper reviews the authentication security architecture available in 3GPP for providing secure access to application services, with emphasis on the interaction of 4G and IMS components, being the first step in a larger 4G-IMS interaction study with regards to security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信