Abstract-The provision of IP Multimedia Subsystem (IMS) introduces important advantages for users of 3G WLAN networks. However, a multi pass authentication procedure needs to be performed before accessing the IMS, resulting in added overhead and quality of service (QoS) degradation, which deters service providers from adopting the IMS model. The problem is further compounded when the user moves from one Wireless Local Area Network (WLAN) domain into another, requiring that the authentication procedure be constantly repeated. To mitigate this problem, we present a lightweight, robust, and architecturecompatible IMS authentication protocol that implements a onepass IMS procedure by promoting efficient key re-use for a mobile user. We derive an analytical model of our proposed scheme, and conduct numerical analysis that reveal a user authentication delay decrease of more than 50 percent.
IP Multimedia Subsystem (IMS) introduces important advantages for users of LTE-femtocell heterogeneous access networks. In order to access services hosted in the IMS layer, the user has to undergo authentication procedure with the access network, followed by an authentication procedure with the IMS layer. This multi-pass authentication procedure is essential for securing IMS from malicious users, resulting in added overhead and possible quality of service degradations. The problem is further compounded when the user moves from one femtocell domain into another, which requires the authentication procedure to be repeated. To mitigate this problem, we present a lightweight, robust, and architecture-compatible IMS authentication protocol that implements a one-pass IMS procedure by promoting efficient key re-use for a mobile user. We make use of Home Node B femtocells to perform the role of IMS proxy. To verify the feasibility of using our protocol in mobile networks, an abstract model of our protocol is derived. The abstract model is emulated using Asterisk server and virtualization techniques. We also analyze the authentication delay of our proposed scheme. Numerical results reveal a reduction in user authentication delay of more than 50 percent compared to the existing authentication procedure.
Abstract-The provision of IP Multimedia Subsystem (IMS) introduces important advantages for users of 3G WLAN networks. However, a multi pass authentication procedure needs to be performed before accessing the IMS, resulting in added overhead and quality of service (QoS) degradation, which deters service providers from adopting the IMS model. The problem is further compounded when the user moves from one Wireless Local Area Network (WLAN) domain into another, requiring that the authentication procedure be constantly repeated. To mitigate this problem, we present a lightweight, robust, and architecturecompatible IMS authentication protocol that implements a onepass IMS procedure by promoting efficient key re-use for a mobile user. We derive an analytical model of our proposed scheme, and conduct numerical analysis that reveal a user authentication delay decrease of more than 50 percent.
Cryptographic techniques are in demand due to vast development in application of information transmission and communication. Image encryption and authentication schemes have been continuously studied to meet the demand of secure image transmission through networks. A number of effective chaos-based image encryption and authentication schemes have been proposed. The intent of this paper is to propose an image encryption and authentication scheme using chaotic map. Arnold cat map is used for diffusion as well as for substitution. This paper applies an alternate structure of the classic block cipher applied with Arnold Cat map is used for encryption and hash function is used for Authentication purpose. The paper that is being followed uses a keyed hash function is introduced to generate hash values from both the plain-image and the secret hash keys [1], which leads to large computational time, whereas our schemes computational time is less as compared to the previous. The experimental results show that the proposed encryption technique is efficient and has high security features.
Number of cryptosystems based on chaos has been proposed, in recent years. Tao Xiang , Kwok-wo Wong, Xiaofeng Liao in 2008 proposed an improved scheme by using a symmetric key block cipher algorithm in which one-dimensional chaotic maps are used, in order to obtain chaotic sequences with better cryptographic feature. In this system, an encryption /decryption scheme was proposed, a cryptographic algorithm using one-dimensional chaotic maps and an external secret key. The chaotic map adopted in this cryptosystem is two logistic maps, and external secret key is of 128-bits. Based on the simulation result, more secure cryptosystem is proposed. As, two logistic maps are used in order to obtain chaotic sequences with improved cryptographic feature. All these advantages make this more secure cryptosystem for the use information transmission over insecure channel and secure application General Terms
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.