A Secure, Green and Optimized Authentication and Key Agreement Protocol for IMS Network

  • Saliha MallemEmail author
  • Chafia YahiaouiEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 746)


IP multimedia subsystem (IMS) is a prominent architectural framework for multimedia services delivery in 4G/5G networks. Authentication is a critical security mechanism which accords authorized users access to these services. As defined by 3rd Generation Partnership Projects (3GPP), IMS- Authentication and Key Agreement protocol (IMS-AKA) is the official authentication procedure in IMS. However, the procedure is prone to different weaknesses both on security (disclosure of identities) and performances (complexity) aspects. This paper proposes an IMS-AKA+ protocol that addresses effectively user’s identities protection by using a key-less cryptography. Furthermore, the proposed algorithm significantly reduces the authentication process complexity due to the use of Elliptic Curve Cryptography (ECC). Simulations were carried out for the IMS-AKA+ protocol and the original IMS-AKA protocol. The results showed that using IMS-AKA+ reduces of up to 28% authentication time is possible, and a saving of 53% of the storage space occurs with an increased security and less energy.


SIP AKA IMS IMS-AKA ECC Authentication Performance 


  1. 1.
    Vrakas, N., Geneiatakis, D., Lambrinoudakis, C.: Obscuring users’ identity in VoIP/IMS environments. Comput. Secur. 43, 145–158 (2014)CrossRefGoogle Scholar
  2. 2.
    Srinivasan, R., Vaidehi, V., Harish, K., Lakshmi Narasimhan, K., Lokeshwer Babu, S., Srikanth, V.: Authentication of signaling in VOIP application. In: APCC, Perth, Australia, October 2005Google Scholar
  3. 3.
    Yoon, E., Yoo, K.: A three-factor authenticated key agreement scheme for SIP on elliptic curves. In: Fourth International Conference on Network and System Security, pp. 334–339 (2010)Google Scholar
  4. 4.
    Huang, C., Li, C.: Authentication and key agreement protocol for UMTS with low bandwidth consumption. In: International Conference AINA, pp. 392–397 (2005)Google Scholar
  5. 5.
    Al-Saraireh, J., Yousef, S.: A new authentication protocol for UMTS mobile networks. EURASIP J. Wirel. Commun. Netw. 2006, 1–10 (2006). Article ID 98107CrossRefzbMATHGoogle Scholar
  6. 6.
    Karopoulos, G., Kambourakis, G., Gritzalis, S., Kanstantinou, E.: A framework for identity privacy in SIP. J. Netw. Comput. Appl. 33(1), 16–28 (2010)CrossRefGoogle Scholar
  7. 7.
    Karopoulos, G., Kambourakis, G., Gritzalis, S.: Caller identity privacy in SIP heterogenous realms: a practical solution. In: IEEE Symposium, ISCC, pp. 37–43 (2008)Google Scholar
  8. 8.
    Ramsdell, B.: RFC 2633: S/MIME version 3 message specification (1999)Google Scholar
  9. 9.
    3GPP: 3G security: access security for IP-based services. TS 33.203, Release 5 (2002)Google Scholar
  10. 10.
    Boman, K., Horn, G., Howard, P., Niemi, V.: UMTS security. Electron. Commun. Eng. J. 14(5), 191–204 (2002)CrossRefGoogle Scholar
  11. 11.
    Menezes, A.: Evaluation of security level of cryptography: the elliptic curve discrete logarithm problem (ECDLP), University of Waterloo (2001)Google Scholar
  12. 12.
    Mccurley, K.S.: The discrete logarithm problem. In: Proceedings of Symposium in Applied Mathematics, pp. 49–74 (1990)Google Scholar
  13. 13.
    Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S. (eds.) 17th International Conference on Computer Aided Verification, Edinburgh, Scotland, vol. 3576, pp. 281–285 (2005)CrossRefGoogle Scholar
  14. 14.
    The AVISPA Team: HLPSL tutorial - a beginner’s guide to modelling and analysing internet security protocols (2006)Google Scholar
  15. 15.
    Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mob. Comput. 5, 128–143 (2006)CrossRefGoogle Scholar
  16. 16.
    Chiang, W., Lin, P.: Certificate-based IP multimedia subsystem authentication and key agreement. In: 13th International Conference on Information Technology, Information Technology: New Generations, p. 177. Springer (2016)Google Scholar
  17. 17.
    Mallem, S., Yahiaoui, C., Zemmache, A.: A new authentication and key agreement protocol for SIP in IMS. In: 12th International Conference of Computer Systems and Applications (AICCSA). IEEE (2015)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Laboratoire de la Communication dans les Systèmes Informatiques (LCSI)Ecole Nationale Supérieure d’InformatiqueAlgiersAlgeria

Personalised recommendations