Deep Analysis of Enhanced Authentication for Next Generation Networks

2010 ◽  
Vol 2 (2) ◽  
pp. 37-52 ◽  
Author(s):  
Mamdouh Gouda

Next Generation Networks (NGN) is the evolution of the telecommunication core. The user has to execute multi-pass Authentication and Key Agreement (AKA) procedures in order to get access to the IP Multimedia Subsystem (IMS). This causes overhead on the AAA server and increases the delay of authenticating the user and that is because of unnecessary and repeated procedures and protocols. This paper presents an enhanced one-pass AKA procedure that eliminates the repeated steps without affecting the security level, in addition it reduces the Denial of Service (DoS) attacks. The presented mechanism has minimal impact on the network infrastructure and functionality and does not require any changes to the existing authentication protocols.

Author(s):  
Mamdouh Gouda

Next Generation Networks (NGN) is the evolution of the telecommunication core. The user has to execute multi-pass Authentication and Key Agreement (AKA) procedures in order to get access to the IP Multimedia Subsystem (IMS). This causes overhead on the AAA server and increases the delay of authenticating the user and that is because of unnecessary and repeated procedures and protocols. This paper presents an enhanced one-pass AKA procedure that eliminates the repeated steps without affecting the security level, in addition it reduces the Denial of Service (DoS) attacks. The presented mechanism has minimal impact on the network infrastructure and functionality and does not require any changes to the existing authentication protocols.


2010 ◽  
Vol 56 (2) ◽  
pp. 117-124 ◽  
Author(s):  
Mosiuoa Tsietsi ◽  
Alfredo Terzoli ◽  
George Wells

Using JAIN SLEE as an Interaction and Policy Manager for Enabler-based Services in Next Generation Networks The IP Multimedia Subsystem is a telecommunications framework with a standard architecture for the provision of services. While the services themselves have not been standardised, standards do exist for basic technologies that can be re-used and aggregated in order to construct more complex services. These elements are called service capabilities by the 3GPP and service enablers by the OMA, both of which are reputable standards bodies in this area. In order to provide re-usability, there is a need to manage access to the service capabilities. Also, in order to build complex services, there is a further need to be able to manage and coordinate the interactions that occur between service capabilities. The 3GPP and the OMA have separately defined network entities that are responsible for handling aspects of these requirements, and are known as a service capability interaction manager (SCIM) and a policy enforcer respectively. However, the internal structure of the SCIM and the policy enforcer have not been standardised by the relevant bodies. In addition, as the SCIM and the policy enforcer have been defined through complementary yet separate processes, there is an opportunity to unify efforts from both bodies. This paper builds on work and standards defined by the bodies, and proposes the design of an interaction manager with features borrowed from both the SCIM and the policy enforcer. To help validate the design, we have identified a platform known as JAIN SLEE which we believe conforms to the model proposed, and we discuss how JAIN SLEE can be used to implement our ideas.


Author(s):  
Yves-Gael Billet ◽  
Christophe Gravier ◽  
Jacques Fayolle

This paper provides the state of art and hints on how to lay the foundations of an adaptive QoS approach in Next Generation Networks (NGN). The key idea is to provide a model, which would offer one application version or another, depending on the Quality of Service (QoS) negotiated at the session establishment in a NGN. The stake of this research is a better-balanced usage of the network, for maximizing the service offered to the user given his or her network capacities. It encompasses the model for such an implementation in a NGN as IP Multimedia Subsystem (IMS).


Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1146 ◽  
Author(s):  
Meriske Chen ◽  
Tian-Fu Lee ◽  
Jiann-I Pan

Agriculture plays an important role for many countries. It provides raw materials for foodand provides large employment opportunities for people in the country, especially for countrieswith a dense population. To enhance agriculture productivity, modern technology such as wirelesssensor networks (WSNs) can be utilized to help in monitoring important parameters in thwagricultural field such as temperature, light, soil moisture, etc. During the monitoring process, ifsecurity compromises happen, such as interception or modification of the parameters, it may leadto false decisions and bring damage to agriculture productivity. Therefore, it is very important todevelop secure authentication and key agreement for the system. Recently, Ali et al. proposed anauthentication and key agreement scheme using WSNs for agriculture monitoring. However, it failsto provide user untraceability, user anonymity, and session key security; it suffers from sensor nodeimpersonation attack and perfect forward secrecy attack; and even worse has denial of service as aservice. This study discusses these limitations and proposes a new secure and more efficientauthentication and key agreement scheme for agriculture monitoring using WSNs. The proposedscheme utilizes dynamic pseudonym identity to guarantee user privacy and eliminates redundantcomputations to enhance efficiency.


Sign in / Sign up

Export Citation Format

Share Document