Challenges to Next Generation Services in IP Multimedia Subsystem |
Chang, Kai-Di
(Dept. of Electrical Engineering, National Taiwan University of Science and Technology)
Chen, Chi-Yuan (Dept. of Electrical Engineering, National Dong Hwa University) Chen, Jiann-Liang (Dept. of Electrical Engineering, National Taiwan University of Science and Technology) Chao, Han-Chieh (Dept. of Electrical Engineering, National Dong Hwa University) |
1 | Yi-Bing Lin, Ming-Feng Chang, Meng-Ta Hsu and Lin-Yi Wu, “One-pass GPRS and IMS authentication procedure for UMTS,” in IEEE Journal on Selected Areas in Communications, Vol.23, pp.1233-1239, 2005. DOI ScienceOn |
2 | Huang C. M. and Li J. W., “One-Pass Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS,” in Proceedings of Advanced Information Networking and Applications, 2007. AINA '07. 21st International Conference on, 2007, pp.482-489. DOI |
3 | Chen C.Y., Wu T.Y., Huang Y.M. and Chao H.C., “An Efficient End-to-end Security Mechanism for IP Multimedia Subsystem,” in Computer Communications, Vol.31, pp.4259-4268, December, 2008. DOI ScienceOn |
4 | Sher. Muhammad, Wu. Shaoke and Magedanz. Thomas, “Security Threats and Solutions for Application Server of IP Multimedia Subsystem (IMS-AS),” in Proceedings of IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation, 2006. MonAM2006, Tuebingen, Germany, September, 28-29, 2006. |
5 | Rebahi Y., Sher M. and Magedanz T., “Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks,” in Proceedings of the 7th ACS/IEEE Intl. Conference on Computer Systems and Applications (AICCSA 2008), Doha, Qatar, March 31 - April 4, 2008, pp.848-851. DOI |
6 | Sher M. and Magedanz T., “Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks,” in Proceedings of Information Assurance and Security, 2007, IAS 2007, Third International Symposium on, 2007, pp.171-176. DOI |
7 | Tirado Ivan, “IP Multimedia Subsystem (IMS) signaling core security,” in Proceedings of the 5th annual conference on Information security curriculum development, Kennesaw, Georgia, USA, 2008. |
8 | Mogno M., Petrilli I. and Listanti M., “Vulnerability in IMS-Internet interworking: analysis and relevant solutions,” in Networking Workshop 2006, 2006. |
9 | Chi-Yuan Chen, Han-Chieh Chao, Sy-Yen Kuo and Kai-Di Chang, “Rule-based Intrusion Detection Mechanism for IP Multimedia Subsystem,” in Journal of Internet Technology, Vol.9, pp.329-336, December, 2008. |
10 | Chakraborty Shyam, Peisa Janne, Frankkila Tomas and Synnergren Per, “IMS Multimedia Telephony over Cellular Systems”, Wiley, 2007. |
11 | 3GPP, “3rd Generation Partnership Project; Technical Specification Group Services and Systems Aspects; IMS media plane security (Release 8); Technical Report 3G TR 33.828 2005. |
12 | 3GPP, “3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Open Service Access (OSA); Parlay X Web Services; Part 2: Third party call (Release 8); Technical Specification 3G TS29.199-2 version 8.0.0, 2007. |
13 | WS–I “Web Services Interoperability Organization,” http://www.ws-i.org/ |
14 | Liotta A. and Ling Lin, “Managing P2P services via the IMS,” in Proceedings of Integrated Network Management, 2007. IM '07. 10th IFIP/IEEE International Symposium on, 2007, pp.586-600. |
15 | Liotta A., Ballette M., Lin L., Gasparoni M., Brick P. and Papadoglou N., “Service-Driven Group Management for Mobile P2P Services,” 2005, pp.221-230. |
16 | Guo Fang Mao, Talevski A. and Chang E., “Voice over Internet Protocol on Mobile Devices,” in Proceedings of Computer and Information Science, 2007. ICIS 2007. 6th IEEE/ACIS International Conference on, 2007, pp.163-169. DOI |
17 | Li S. and Knudsen J., “Beginning J2ME: from novice to professional”, 3rd, Apress, 2005. |
18 | IETF, “SDP: Session Description Protocol; SDP: Session Description Protocol; RFC 4566, 2006. |
19 | Masonta M. T., Oyedapo O. J. and Kurien A. M., “Mobile Client for the Next Generation Networks,” in Proceedings of Broadband Communications, Information Technology & Biomedical Applications, 2008 Third International Conference on, 2008, pp.274-279. DOI |
20 | Nokia and JCP, “JSR 180 - SIP API for Java 2 Micro Edition,” in Vol.1.0.1, 2004. |
21 | 3GPP, “3rd Generation Partnership Project; Technical Specification Group Services and Systems Aspects; 3G security; Network Domain Security; IP network layer security (Release 7); Technical Specification 3G TS 33.210 2005. |
22 | 3GPP, “3rd Generation Partnership Project; Technical Specification Group Services and Systems Aspects; 3G security; Access security for IP-based services (Release 7); Technical Specification 3G TS 33.203 2005. |
23 | Jain M. and Prokopi M., “The IMS 2.0 Service Architecture,” in Proceedings of Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST '08. The Second International Conference on, 2008, pp.3-9. DOI |
24 | What Is Web 2.0 Design Patterns and Business Models for the Next Generation of Software, http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-Web-20.html |
25 | 3GPP, “3rd Generation Partnership Project; Open Service Access (Release 7); Technical Specification 3G TS 23.198 version 0.7.0, 2007. |
26 | Camarillo G. and Garcia-Martin M.A., “The 3G IP multimedia subsystem (IMS): Merging the Internet and the cellular worlds”. Chichester, UK, John Wiley & Sons, 2004. |
27 | 3GPP, “3rd Generation Partnership Project; Technical Specification Group Services and Systems Aspects; Telecommunication management; Charging management; IP Multimedia Subsystem (IMS) charging (Release 8); Technical Specification 3G TS 32.260 version 8.2.0, 2007. |
28 | 3GPP, “3rd Generation Partnership Project; Technical Specification Group Services and Systems Aspects; End-to-end Quality of Service (QoS) concept and architecture (Release 7); Technical Specification 3G TS 23.207 version 7.0.0, 2007. |