End-to-middle-to-end solution for IMS media plane security
dc.contributor.author | Fajardo, JO | |
dc.contributor.author | Liberal, F | |
dc.contributor.author | Li, F | |
dc.contributor.author | Clarke, Nathan | |
dc.contributor.author | Mkwawa, Is-Haka | |
dc.date.accessioned | 2017-12-07T13:33:42Z | |
dc.date.available | 2017-12-07T13:33:42Z | |
dc.date.issued | 2014-10-30 | |
dc.identifier.issn | 1389-5753 | |
dc.identifier.issn | 1572-9362 | |
dc.identifier.other | 3 | |
dc.identifier.uri | http://hdl.handle.net/10026.1/10388 | |
dc.description.abstract |
© 2014 Springer Science+Business Media New York IP multimedia subsystem (IMS) is becoming the prevailing candidate for managing future mobile multimedia communications, including critical communications such as public safety, emergency professionals and corporate networks. IMS security and privacy has gained much attention in the few last years. The review of recent IMS security activities stresses the inclusion of intermediate nodes in the media path of secured communications as an open issue. This paper presents an end-to-middle-to-end solution which enables the usage of IMS media plane elements such as recorders, transcoders and novel cross-ciphering functions in a secure way. The proposed solution, which is fully compliant with IMS, includes the network architecture, the signaling plane for session signaling and key management, and the media-plane security characteristics. Experimental results demonstrate that the proposed solution can provide media interoperability (both transcoding and cross-ciphering) with a cost of 17 % overhead to a standard IMS call setup in the signaling plane. | |
dc.format.extent | 719-746 | |
dc.language | en | |
dc.language.iso | en | |
dc.publisher | Springer Science and Business Media LLC | |
dc.title | End-to-middle-to-end solution for IMS media plane security | |
dc.type | journal-article | |
dc.type | Article in Press | |
plymouth.issue | 3 | |
plymouth.volume | 19 | |
plymouth.publication-status | Accepted | |
plymouth.journal | Electronic Commerce Research | |
dc.identifier.doi | 10.1007/s10660-014-9170-3 | |
plymouth.organisational-group | /Plymouth | |
plymouth.organisational-group | /Plymouth/Faculty of Science and Engineering | |
plymouth.organisational-group | /Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics | |
plymouth.organisational-group | /Plymouth/Users by role | |
plymouth.organisational-group | /Plymouth/Users by role/Academics | |
dcterms.dateAccepted | 2014-10-29 | |
dc.identifier.eissn | 1572-9362 | |
dc.rights.embargoperiod | Not known | |
rioxxterms.funder | European Commission | |
rioxxterms.identifier.project | GERYON (Next generation technology independent interoperability of emergency services) | |
rioxxterms.versionofrecord | 10.1007/s10660-014-9170-3 | |
rioxxterms.licenseref.uri | http://www.rioxx.net/licenses/all-rights-reserved | |
rioxxterms.licenseref.startdate | 2014-10-30 | |
rioxxterms.type | Journal Article/Review | |
plymouth.funder | GERYON (Next generation technology independent interoperability of emergency services)::European Commission |