The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2013
DOI: 10.1109/surv.2012.072412.00169
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the Security and Privacy Protection Level of IP Multimedia Subsystem Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 25 publications
0
11
0
Order By: Relevance
“…Besides this categorization, [32] also discriminates internal and external attacks and the effects of attacks in terms of confidentiality, integrity, authentication and service availability. Based on these categories, [32] provides a thorough evaluation of the robustness of the IMS architecture proposed by the 3GPP as well as considering a series of state-of-the-art research proposals.…”
Section: Ims Signaling Plane Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Besides this categorization, [32] also discriminates internal and external attacks and the effects of attacks in terms of confidentiality, integrity, authentication and service availability. Based on these categories, [32] provides a thorough evaluation of the robustness of the IMS architecture proposed by the 3GPP as well as considering a series of state-of-the-art research proposals.…”
Section: Ims Signaling Plane Securitymentioning
confidence: 99%
“…IMS security and privacy has been a challenging topic and has received a significant amount of attention during the last few years [32,22]. Although IMS benefits from specific security and privacy mechanisms in the LTE air interface and core infrastructure [16], additional IMS-level mechanisms are required especially in multi-domain communications.…”
Section: Introductionmentioning
confidence: 99%
“…12 Moreover, this category contains, the efforts made by attackers to disturb sequence of messages. A malicious user can target these ongoing connections in order to disturb users' calls through manipulated messages.…”
Section: Sip Flow Tamperingmentioning
confidence: 99%
“…BYE, CAN-CEL, UPDATE, Re-INVITE, and REGISTER requests can be applied to launch such attacks. 12 Moreover, this category contains, the efforts made by attackers to disturb sequence of messages. In this case, the attacker can put system's accessibility at risk by creating numerous pending requests especially when the proxy server is stateful.…”
Section: Sip Flow Tamperingmentioning
confidence: 99%
“…Reference [13] differentiates between the 3GPP intra and inter domain security architectures and categorizes the possible time-dependent and time-independent attacks to the IMS signaling plane. Besides this categorization, [32] also discriminates internal and external attacks and the effects of attacks in terms of confidentiality, integrity, authentication and service availability. Based on these categories, [32] provides a thorough evaluation of the robustness of the IMS architecture proposed by the 3GPP as well as considering a series of state-of-the-art research proposals.…”
mentioning
confidence: 99%