{"title":"Unveiling confidentiality-related vulnerabilities in an IMS-based environment","authors":"Ilyas Ed-daoui, T. Mazri, N. Hmina","doi":"10.1109/ICMCS.2016.7905652","DOIUrl":null,"url":null,"abstract":"Long Term Evolution (LTE) is spreading and becoming the dominant cellular networking technology. This revolution of telecommunication network implementation methodology from its circuit-switched pattern towards a packet-switched network that resembles the ordinary packet-based networks, like Internet. Moreover, cellular network operators have adopted a new mechanism, in order to handle voice calls over the LTE network, called Voice over LTE (VoLTE), which changes how these voice calls are handled, from both user equipment and infrastructure perspectives. As a result, the VoLTE setup is controlled and performed by the Application Server (AS), using Session Initiation Protocol (SIP) and Real-time Transport Protocol (RTP), unlike the traditional call setup in previous cellular network generations. This radical shift opens up a number of new vulnerabilities that could not be previously explored especially regarding confidentiality, which this paper presents a systematic security analysis, results and solution.","PeriodicalId":386031,"journal":{"name":"International Conference on Multimedia Computing and Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Multimedia Computing and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMCS.2016.7905652","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Long Term Evolution (LTE) is spreading and becoming the dominant cellular networking technology. This revolution of telecommunication network implementation methodology from its circuit-switched pattern towards a packet-switched network that resembles the ordinary packet-based networks, like Internet. Moreover, cellular network operators have adopted a new mechanism, in order to handle voice calls over the LTE network, called Voice over LTE (VoLTE), which changes how these voice calls are handled, from both user equipment and infrastructure perspectives. As a result, the VoLTE setup is controlled and performed by the Application Server (AS), using Session Initiation Protocol (SIP) and Real-time Transport Protocol (RTP), unlike the traditional call setup in previous cellular network generations. This radical shift opens up a number of new vulnerabilities that could not be previously explored especially regarding confidentiality, which this paper presents a systematic security analysis, results and solution.