Show simple item record

dc.contributor.authorFajardo, JO
dc.contributor.authorLiberal, F
dc.contributor.authorLi, F
dc.contributor.authorClarke, Nathan
dc.contributor.authorMkwawa, Is-Haka
dc.date.accessioned2023-10-20T11:55:01Z
dc.date.available2023-10-20T11:55:01Z
dc.date.issued2019-09
dc.identifier.issn1389-5753
dc.identifier.issn1572-9362
dc.identifier.urihttps://pearl.plymouth.ac.uk/handle/10026.1/21475
dc.description.abstract

IP multimedia subsystem (IMS) is becoming the prevailing candidate for managing future mobile multimedia communications, including critical communications such as public safety, emergency professionals and corporate networks. IMSsecurity and privacy has gained much attention in the few last years. The review of recent IMS security activities stresses the inclusion of intermediate nodes in the media path of secured communications as an open issue. This paper presents an end-to-middle-to-end solution which enables the usage of IMS media plane elements such as recorders, transcoders and novel cross-ciphering functions in a secure way. The proposed solution, which is fully compliant with IMS, includes the network architecture, the signaling plane for session signaling and key management, and the media-plane security characteristics. Experimental results demonstrate that the proposed solution can provide media interoperability (both transcoding and cross-ciphering) with a costof 17 % overhead to a standard IMS call setup in the signaling plane.

dc.format.extent719-746
dc.languageen
dc.publisherSpringer Science and Business Media LLC
dc.subjectIMS
dc.subjectMedia plane security
dc.subjectCross-ciphering
dc.subjectSecurity resource function
dc.titleEnd-to-middle-to-end solution for IMS media plane security
dc.typeJournal Article
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000482479500011&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.issue3
plymouth.volume19
plymouth.publication-statusPublished
plymouth.journalElectronic Commerce Research
dc.identifier.doi10.1007/s10660-019-09367-2
plymouth.organisational-group|Plymouth
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering|School of Engineering, Computing and Mathematics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA
plymouth.organisational-group|Plymouth|Users by role
plymouth.organisational-group|Plymouth|Users by role|Academics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA|UoA11 Computer Science and Informatics
dc.date.updated2023-10-20T11:55:01Z
dc.rights.embargodate2023-10-21
dc.identifier.eissn1572-9362
dc.rights.embargoperiod
rioxxterms.versionofrecord10.1007/s10660-019-09367-2


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV