Skip to main content

Introducing the GBA Covert Channel in IP Multimedia Subsystem (IMS)

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 428))

Abstract

IP Multimedia Subsystem (IMS) is an access-agnostic IP-based technology to provide a wide range of real-time communication and multimedia services for end-users. Security is one of the main challenges in large-scale deployment of IMS. In this paper, we have focused on a particular security hole in the authentication process in IMS. We introduce and discuss the application scenarios of a new covert channel in Generic Bootstrapping Architecture (GBA). GBA-based authentication is part of GAA standard based on shared-secret published by 3GPP. It is demonstrated that this vulnerability can be established to gain unauthorized access to unlawfully utilize the services.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. 3GPP, Overview of 3GPP Release 5 - Summary of all Release 5 Features. 3GPP - ETSI Mobile Competence Centre, Technical report (2003)

    Google Scholar 

  2. Salchow, K.: Introduction to the IP Multimedia Subsystem (IMS): IMS Basic Concepts and Terminology. Whitepaper F5 Netw. Inc. (2007)

    Google Scholar 

  3. 3GPP TS 33.102 V11.5.0., Technical Specification Group Services and System Aspects; 3G Security; Security architecture (2012)

    Google Scholar 

  4. Department of Defense. Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD (The Orange Book) edition (December 1985)

    Google Scholar 

  5. McFail, M.: Covert storage channels: A brief overview. In: PACISE Conference, Bloomsburg, PA (2005)

    Google Scholar 

  6. Pennington, E., Oblitey, W., Ezekiel, S., Wolfe, J.: An Overview of Covert Channels. Covert Channels Research Group Computer Science Department IUP, Indiana

    Google Scholar 

  7. 3GPP TS 33.222: Generic Authentication Architecture (GAA); Access to network applica-tion functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS), (Release 12) (2013)

    Google Scholar 

  8. 3GPP TS 33.220: Generic Authentication Architecture (GAA); Generic bootstrapping architecture, (Release 12) (2013)

    Google Scholar 

  9. Ilyas, M., Ahson, S.A.: IP Multimedia Subsystem (IMS) Handbook. CRC Press, Boca Raton (2008)

    Google Scholar 

  10. Olkkonen, T.: Generic Authentication Architecture. In: Security and Privacy in Pervasive Computing, Seminar on Network Security, Espoo 2006

    Google Scholar 

  11. Millen, J.: 20 years of covert channel modeling and analysis. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 113–114 (1999)

    Google Scholar 

  12. Mazurczyk, W., Szczypiorski, K.: Covert channels in SIP for VoIP signalling. In: Jahankhani, H., Revett, K., Palmer-Brown, D. (eds.) Global E-Security, pp. 65–72. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  13. Cabuk, S., Brodley, C.E., Shields, C.: IP covert channel detection. ACM Trans. Inf. Syst. Secur. TISSEC 12(4), 22 (2009)

    Google Scholar 

  14. Gallagher, P.R.: A guide to understanding covert channel analysis of trusted systems, National Computer Security Center, USA (1993). http://fas.org/irp/nsa/rainbow/tg030.htm

  15. Zander, S., Armitage, G., Branch, P.: Covert channels in the IP time to live field. In: Proceedings of Australian Telecommunication Networks and Applications Conference (ATNAC) (2006)

    Google Scholar 

  16. Kasera, S., Narang, N.: 3G Networks. Tata McGraw-Hill Education, New York (2004)

    Google Scholar 

  17. 3GPP TS 33.919; Generic Authentication Architecture (GAA); System description, (Release 11) (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ghader Ebrahimpour .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Ebrahimpour, G., Khorsandi, S., Piroozi, A. (2014). Introducing the GBA Covert Channel in IP Multimedia Subsystem (IMS). In: Jahangir, A., Movaghar, A., Asadi, H. (eds) Computer Networks and Distributed Systems. CNDS 2013. Communications in Computer and Information Science, vol 428. Springer, Cham. https://doi.org/10.1007/978-3-319-10903-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10903-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10902-2

  • Online ISBN: 978-3-319-10903-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics