Analyzing the mutual authenticated session key in IP multimedia server-client systems for 4G networks
نویسندگان
چکیده
This paper scrutinizes the authentication and key agreement protocol adopted by the Universal Mobile Telecommunication System to meet the standards of a fourth-generation network. Lately, communication of multimedia (CoM) has drawn the attention of researchers for the future of secure wireless mobile communication. However, the CoM has not had any defensive mechanism to fulfil the specifications of 3GPP and reduce the computation and communication overheads and susceptible attacks like redirection, man-in-the-middle, and denial of service attacks. In addition, this paper has thoroughly investigated some existing protocols from the literature for the identification of new challenges in server-client authentication. To probe the challenges of the existing schemes realistically, the multimedia client and multimedia server components (proxy, interrogating, serving, and home subscriber server) were physically deployed on the Linux platform to examine the specifications of 3GPP, vulnerable attacks, computation, and communication overheads. We observed that the examined existing schemes are not able to fulfill the above criteria. We thus propose addition of the mutual authenticated session key (MASK) to the physical environment of the multimedia server-client. To satisfy the 3GPP specifications, the protocol of MASK offers mutual authenticity to the multimedia server-client. Moreover, the feature of mutual authenticity reduces the computation and communication overheads of the multimedia server-client. Since the session keys are jointly shared between the multimedia server and client, the protocol of MASK can additionally provide privacy preservation and forward secrecy.
منابع مشابه
Interoperation Key Schema for Social Media Tools in IP Multimedia Subsystem
IP Multimedia Subsystem (IMS) is now being a solution for packet switched networks. The future generation network is amalgamating the infrastructure of Wireless / wireline for providing the standard interface for Internet services. Nevertheless, the network infrastructures like multimedia and non-multimedia do not have any native mechanism to interpret the key schema of client media tools to es...
متن کاملClient-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting
The area of password-based authenticated key establishment protocols has been the subject of a vast amount of work in the last few years due to its practical aspects. Despite the attention given to it, most passwordauthenticated key establishment (PAKE) schemes in the literature consider authentication between a client and a sever. Although some of them are extended to a threeparty PAKE protoco...
متن کاملA New Cross-Realm Client-to-Client Password-Authentication Key Exchange Protocol
A cross-realm client-to-client password-authenticated key exchange (CR-C2C-PAKE) protocol provides a method of key exchange based on password-authenticated between clients registered in different servers. Our proposed CR-C2C-PAKE protocol can be implemented in secret-key setting. It can resist all types of known attacks including the password-compromise impersonation attack. We use common stora...
متن کاملAchieving Better Privacy for the 3GPP AKA Protocol
Proposed by the 3rd Generation Partnership Project (3GPP) as a standard for 3G and 4G mobile-network communications, the AKA protocol is meant to provide a mutually-authenticated key-exchange between clients and associated network servers. As a result AKA must guarantee the indistinguishability from random of the session keys (key-indistinguishability), as well as clientand server-impersonation...
متن کاملPassword-Authenticated Key Exchange between Clients in a Cross-Realm Setting
The area of password-based authenticated key exchange protocols has been the subject of a vast amount of work in the last few years due to its practical aspects. AuthA is an example of such a technology considered for standardization by the IEEE P1363.2 working group. Unfortunately in its current form AuthA, including some variants, only considered the classic client and server (2-party) scenar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016