Abstract
IP Multimedia Subsystem (IMS) is an access-agnostic IP-based technology to provide a wide range of real-time communication and multimedia services for end-users. Security is one of the main challenges in large-scale deployment of IMS. In this paper, we have focused on a particular security hole in the authentication process in IMS. We introduce and discuss the application scenarios of a new covert channel in Generic Bootstrapping Architecture (GBA). GBA-based authentication is part of GAA standard based on shared-secret published by 3GPP. It is demonstrated that this vulnerability can be established to gain unauthorized access to unlawfully utilize the services.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
3GPP, Overview of 3GPP Release 5 - Summary of all Release 5 Features. 3GPP - ETSI Mobile Competence Centre, Technical report (2003)
Salchow, K.: Introduction to the IP Multimedia Subsystem (IMS): IMS Basic Concepts and Terminology. Whitepaper F5 Netw. Inc. (2007)
3GPP TS 33.102 V11.5.0., Technical Specification Group Services and System Aspects; 3G Security; Security architecture (2012)
Department of Defense. Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD (The Orange Book) edition (December 1985)
McFail, M.: Covert storage channels: A brief overview. In: PACISE Conference, Bloomsburg, PA (2005)
Pennington, E., Oblitey, W., Ezekiel, S., Wolfe, J.: An Overview of Covert Channels. Covert Channels Research Group Computer Science Department IUP, Indiana
3GPP TS 33.222: Generic Authentication Architecture (GAA); Access to network applica-tion functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS), (Release 12) (2013)
3GPP TS 33.220: Generic Authentication Architecture (GAA); Generic bootstrapping architecture, (Release 12) (2013)
Ilyas, M., Ahson, S.A.: IP Multimedia Subsystem (IMS) Handbook. CRC Press, Boca Raton (2008)
Olkkonen, T.: Generic Authentication Architecture. In: Security and Privacy in Pervasive Computing, Seminar on Network Security, Espoo 2006
Millen, J.: 20 years of covert channel modeling and analysis. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 113–114 (1999)
Mazurczyk, W., Szczypiorski, K.: Covert channels in SIP for VoIP signalling. In: Jahankhani, H., Revett, K., Palmer-Brown, D. (eds.) Global E-Security, pp. 65–72. Springer, Heidelberg (2008)
Cabuk, S., Brodley, C.E., Shields, C.: IP covert channel detection. ACM Trans. Inf. Syst. Secur. TISSEC 12(4), 22 (2009)
Gallagher, P.R.: A guide to understanding covert channel analysis of trusted systems, National Computer Security Center, USA (1993). http://fas.org/irp/nsa/rainbow/tg030.htm
Zander, S., Armitage, G., Branch, P.: Covert channels in the IP time to live field. In: Proceedings of Australian Telecommunication Networks and Applications Conference (ATNAC) (2006)
Kasera, S., Narang, N.: 3G Networks. Tata McGraw-Hill Education, New York (2004)
3GPP TS 33.919; Generic Authentication Architecture (GAA); System description, (Release 11) (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Ebrahimpour, G., Khorsandi, S., Piroozi, A. (2014). Introducing the GBA Covert Channel in IP Multimedia Subsystem (IMS). In: Jahangir, A., Movaghar, A., Asadi, H. (eds) Computer Networks and Distributed Systems. CNDS 2013. Communications in Computer and Information Science, vol 428. Springer, Cham. https://doi.org/10.1007/978-3-319-10903-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-10903-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10902-2
Online ISBN: 978-3-319-10903-9
eBook Packages: Computer ScienceComputer Science (R0)