The main idea of the third generation (3G) networks is to merge two of the most important communications systems: Cellular networks and Internet. The IP Multimedia Subsystem was defined by 3GPP as the key element in the 3G architecture that makes it possible to provide ubiquitous cellular access to all the services provided by the Internet. In this scenario a secure mobile service becomes an important issue. Considering that Mobile IPv6 and SIP are key technologies for mobility management and provision of services in IMS respectively, this article shows the impact of different security levels and types of mobility using as security performance parameters the average authentication cost and the average authentication delay and suggests a method where the user can choose the security level as a function of the distance to the IMS Home domain and IMS CN (Correspondent Node) Terminal. Copyright 2007 ACM.
Performance study of IMS authentication procedures in mobile 3G networks / Alessandro, Anzaloni; Listanti, Marco; Ivan, Petrilli. - STAMPA. - (2007), pp. 248-253. (Intervento presentato al convegno IWCMC 2007: 2007 International Wireless Communications and Mobile Computing Conference tenutosi a Honolulu; United States nel 12 August 2007 through 16 August 2007) [10.1145/1280940.1280994].
Performance study of IMS authentication procedures in mobile 3G networks
LISTANTI, Marco;
2007
Abstract
The main idea of the third generation (3G) networks is to merge two of the most important communications systems: Cellular networks and Internet. The IP Multimedia Subsystem was defined by 3GPP as the key element in the 3G architecture that makes it possible to provide ubiquitous cellular access to all the services provided by the Internet. In this scenario a secure mobile service becomes an important issue. Considering that Mobile IPv6 and SIP are key technologies for mobility management and provision of services in IMS respectively, this article shows the impact of different security levels and types of mobility using as security performance parameters the average authentication cost and the average authentication delay and suggests a method where the user can choose the security level as a function of the distance to the IMS Home domain and IMS CN (Correspondent Node) Terminal. Copyright 2007 ACM.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.