9,530 research outputs found
Options for Securing RTP Sessions
The Real-time Transport Protocol (RTP) is used in a large number of
different application domains and environments. This heterogeneity
implies that different security mechanisms are needed to provide
services such as confidentiality, integrity, and source
authentication of RTP and RTP Control Protocol (RTCP) packets
suitable for the various environments. The range of solutions makes
it difficult for RTP-based application developers to pick the most
suitable mechanism. This document provides an overview of a number
of security solutions for RTP and gives guidance for developers on
how to choose the appropriate security mechanism
Interworking Architectures in Heterogeneous Wireless Networks: An Algorithmic Overview
The scarce availability of spectrum and the proliferation of
smartphones, social networking applications, online gaming
etc., mobile network operators (MNOs) are faced with an
exponential growth in packet switched data requirements on
their networks. Haven invested in legacy systems (such as
HSPA, WCDMA, WiMAX, Cdma2000, LTE, etc.) that have
hitherto withstood the current and imminent data usage
demand, future and projected usage surpass the capabilities of the evolution of these individual technologies. Hence, a more critical, cost-effective and flexible approach to provide ubiquitous coverage for the user using available spectrum is of high demand. Heterogeneous Networks make use of these legacy systems by allowing users to connect to the best network available and most importantly seamlessly handover active sessions amidst them. This paper presents a survey of interworking architectures between IMT 2000 candidate networks that employ the use of IEFT protocols such as MIP, mSCTP, HIP, MOBIKE, IKEV2 and SIP etc. to bring about this much needed capacity
AAA architectures applied in multi-domain IMS (IP multimedia subsystem)
There is a group of communication services that use\ud
resources from multiple domains in order to deliver their service.\ud
Authorization of the end-user is important for such services,\ud
because several domains are involved. There are no current\ud
solutions for delivering authentication, authorization and\ud
accounting (AAA) to multi-domain services. In our study we\ud
present two architectures for the delivery of AAA to such\ud
services. The architectures are analyzed on their qualitative\ud
aspects. A result of this analysis is that direct interconnection of\ud
AAA servers is an effective architectural solution. In current\ud
multi-domain IP Multimedia Subsystem (IMS) architectures,\ud
direct interconnection of AAA servers, such as the Home\ud
Subscriber Servers (HSS), is not yet possible. In this paper we\ud
argue and recommend to extend the IMS specification by adding\ud
a new interface to HSS in order to support the direct\ud
interconnection of HSS/AAA servers located in different IMS\ud
administrative domains
Preventing Distributed Denial-of-Service Attacks on the IMS Emergency Services Support through Adaptive Firewall Pinholing
Emergency services are vital services that Next Generation Networks (NGNs)
have to provide. As the IP Multimedia Subsystem (IMS) is in the heart of NGNs,
3GPP has carried the burden of specifying a standardized IMS-based emergency
services framework. Unfortunately, like any other IP-based standards, the
IMS-based emergency service framework is prone to Distributed Denial of Service
(DDoS) attacks. We propose in this work, a simple but efficient solution that
can prevent certain types of such attacks by creating firewall pinholes that
regular clients will surely be able to pass in contrast to the attackers
clients. Our solution was implemented, tested in an appropriate testbed, and
its efficiency was proven.Comment: 17 Pages, IJNGN Journa
The Dutch interbank computer network
At the end of 1980, a strategic decision was made by the Dutch banks and savings banks to commence the development of a Data Communications Infrastructure (DCI), to be used for a number of forthcoming interbank applications. It was agreed that this new data communications infrastructure should be based on the emerging Reference Model for Open Systems Interconnection (OSI). The first interbank application using the DCI (i.e. urgent money transfers) was introduced in the second quarter of 1985. Other interbank applications, which will also make use of the functions provided by the DCI, are currently being developed.\ud
\ud
This paper provides the background to the DCI project, discusses the selection of OSI standards for the network, and gives an overview of the design of the software package, which was developed to support the selected OSI standards
- …