IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services

A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services
View Sample PDF
Author(s): Nikos Vrakas (University of Piraeus, Greece)and Costas Lambrinoudakis (University of Piraeus, Greece)
Copyright: 2011
Volume: 4
Issue: 2
Pages: 16
Source title: International Journal of Information Technologies and Systems Approach (IJITSA)
Editor(s)-in-Chief: Sangbing (Jason) Tsai (International Engineering and Technology Institute (IETI), Hong Kong)and Wei Liu (Qingdao University, China)
DOI: 10.4018/jitsa.2011070103

Purchase

View A Cross Layer Spoofing Detection Mechanism for Multimedia Communication Services on the publisher's website for pricing and purchasing information.

Abstract

The convergence of different network types under the same architecture offers the opportunity for low cost multimedia services. The main objective has been the high quality of the provided services. However, considering that older equipment with limited processing capabilities may be present in such environments, a tradeoff between security and service quality is inevitable. Specifically, low resource enabled devices cannot utilize state of the art security mechanisms, such as IPSec tunnels, integrity mechanisms, etc., and they simply employ HTTP Digest authentication. The lack of integrity mechanisms in particular raises many security concerns for the IMS infrastructures. Attacks such as Man in the Middle (MitM), spoofing, masquerading, and replay that can be launched in IMS environments, have been pinpointed in bibliography by various researchers. Moreover, an internal attacker may utilize his legitimate security tunnels in order to launch spoofing and identity theft attacks. This paper presents a cross-layer spoofing detection mechanism that protects SIP-based infrastructures from the majority of the aforementioned attacks without requiring an additional cryptographic scheme which would inevitably introduce considerable overheads.

Related Content

Tianlong Wang, Chaoyang Wang, Zhiqiang Liu, Shuai Ma, Huibo Yan. © 2024. 15 pages.
Xudong Cao, Chenchen Chen, Lejia Zhang, Li Pan. © 2024. 25 pages.
Shengfeng Xie, Jingwei Li. © 2024. 20 pages.
Xiaoyuan Wang, Hongfei Wang, Jianping Wang, Jiajia Wang. © 2024. 24 pages.
Jiao Hao, Zongbao Zhang, Yihan Ping. © 2024. 14 pages.
Qinmei Wang. © 2024. 13 pages.
Wenzhen Mai, Mohamud Saeed Ambashe, Chukwuka Christian Ohueri. © 2024. 18 pages.
Body Bottom