Presence Based Secure Instant Messaging Mechanism for IP Multimedia Subsystem

  • Zeeshan Shafi Khan
  • Muhammad Sher
  • Khalid Rashid
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6786)

Abstract

Presence and instant messaging are the two important services offered on top of IP Multimedia subsystem. Instant messages can be session based or immediate. In both cases there are some security threats like session modification, session termination, invite flooding and message flooding, etc. In this paper, a presence based solution to mitigate the effect of these attacks is proposed. Results show that the proposed solution performs well to secure the instant messaging.

Keywords

Presence Instant Messaging IP Multimedia Subsystem 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Poikselka, M., Mayer, G., Khartabil, H., Niemi, A.: IP multimedia concepts and services, 2nd edn. John Wiley & Sons Ltd., Chichester (2006)CrossRefGoogle Scholar
  2. 2.
    Day, M., Aggarwal, S., Mohr, G., Vincent, J.: A model for presence and instant messaging. Request for Comments: 2778 (2000)Google Scholar
  3. 3.
    Day, M., Aggarwal, S., Mohr, G., Vincent, J.: Instant messaging/presence protocol requirements. Request for Comments: 2779 (2000)Google Scholar
  4. 4.
    Milewski, A.E., Smith, T.M.: Providing presence cues to telephone users. In: CSCW 2000, Philadelphia, December 2-6 (2000)Google Scholar
  5. 5.
    3GPP TR 22.940 IP Multimedia Subsystem (IMS) messaging; Stage 1 Google Scholar
  6. 6.
    Conlan, O., Power, R., Barrett, K.: Next generation context aware adaptive services. In: Proceedings of the 1st International Symposium on Information and Communication Technologies, Dublin, Ireland (2003)Google Scholar
  7. 7.
    Pailer, R., Stadler, J., Miladinovic, I.: Using PARLAY APIs over a sip system in a distributed service platform for carrier grade multimedia services. Wireless Networks 9, 353–363 (2003)CrossRefGoogle Scholar
  8. 8.
    Wegscheider, F.: Minimizing unnecessary notification traffic in the IMS presence system. In: 1st International Symposium on Wireless Pervasive Computing (2006)Google Scholar
  9. 9.
    Singh, V.K., Schulzrinne, H.: A survey of security issues and solutions in presence, www1.cs.columbia.edu/~vs2140/presence/presencesecurity.pdf
  10. 10.
    Pailer, R., Wegscheider, F., Bessler, S.: A terminal-based location service enabler for the IP multimedia subsystem. In: Proceedings of WCNC 2006 (2006)Google Scholar
  11. 11.
    Kranz, M., Holleis, P., Schmidt, A.: Ubiquitous presence systems. In: Proceedings of SAC 2006, Dijon, France, April 23-27 (2006)Google Scholar
  12. 12.
    Rosenberg, J.: Presence authorization rules, Request for Comments: 5025 (2007)Google Scholar
  13. 13.
    Jiang, D., Yeap, T.H., Logrippo, L., Liscano, R.: Personalization for SIP multimedia communications with presence, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.8748
  14. 14.
    Salinas, A.: Advantages and disadvantages of using presence service, http://www.tml.tkk.fi/Publications/C/21/salinas_ready.pdf
  15. 15.
    Sedlar, U., Bodnaruk, D., Zebec, L., Kos, A.: Using aggregated presence information in an enterprise environment, https://www.icin.biz/files/programmes/Poster-7.pdf
  16. 16.
    Wang, L., Gu, D.: A study on session setup for group communications in push-to-talk over cellular using rich presence, ieeexplore.ieee.org/iel5/4391971/4391972/04392055.pdf?arnumber=4392055
  17. 17.
    Peternel, K., Zebec, L., Kos, A.: Using presence information for an effective collaboration. In: 6th International Symposium on Communication Systems, Networks and Digital Signal Processing (2008)Google Scholar
  18. 18.
    Chen, W.-E., Lin, Y.-B., Liou, R.-H.: A weakly consistent scheme for IMS presence service. IEEE Transactions on Wireless Communications 8(7) (2009)Google Scholar
  19. 19.
    Zheng, W., Zhang, C., Yu, C., Yang, P., Mu, Y., Zhang, X.: Design of presence based dynamic group IM in IMS. In: Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC (2009)Google Scholar
  20. 20.
    Bellavista, P., Corradi, A., Foschini, L.: IMS-based presence service with enhanced scalability and guaranteed QoS for interdomain enterprise mobility. IEEE Wireless Communications 16(3) (2009)Google Scholar
  21. 21.
    Bellavista, P., Corradi, A., Foschini, L.: Enhancing the scalability of IMS-based presence service for LBS applications. In: Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications (2009)Google Scholar
  22. 22.
    Khan, Z.S., Sher, M., Rashid, K., Rahim, A.: A three layer se-cure architecture for IP multimedia subsystem based instant messaging. Information Security Journal: A Global Prespective 18, 1–10 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Zeeshan Shafi Khan
    • 1
  • Muhammad Sher
    • 2
  • Khalid Rashid
    • 2
  1. 1.Center of Excellence in Information AssuranceKing Saud UniversitySaudi Arabia
  2. 2.International Islamic UniversityIslamabadPakistan

Personalised recommendations