Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A criteria-based evaluation framework for authentication schemes in IMS
Responsible organisation
2009 (English)Conference paper, (Refereed) PublishedAlternative title
Ett kriteriebaserat utvärderingsramverk för autentiseringsmodeller i IMS (Swedish)
Abstract [en]

The IP Multimedia Subsystem (IMS) is regarded as one of the most prominent enablers for successful service provisioning across different access network technologies and devices. While new paradigms, e.g. seamless communication, enter the IMS, existing solutions, e.g. for authentication, need to be redefined, which is one of the major activities within the EUREKA!-funded Mobicome project, involving operators, manufacturers and academia. As there exist several candidate solutions for providing seamless authentication, there is a need for a set of criteria that helps to select the candidate that fulfils those criteria in a bestpossible way. Given this background, this position paper proposes a framework of criteria for the evaluation of authentication schemes in IMS. The primary criteria are security, user-friendliness and simplicity. Inbetween these criteria, the secondary criteria can be found. These are awareness, usability and algorithms. Each criterion, both primary and secondary, is then also divided into one or several substantiating sub-criteria. The discussion of the criteria is followed by a description of the evaluation methodology, which comprises both qualitative and quantitative evaluations such as SWOT analysis, use of NIST and ISO guidelines, user rankings, and measurements of authentication times. The paper is concluded with an outlook on future work, including studies and experiments.

Place, publisher, year, edition, pages
Fukuoka, Japan: IEEE , 2009.
Keyword [en]
IMS security, seamless authentication, evaluation criteria
National Category
Telecommunications Human Aspects of ICT
Identifiers
URN: urn:nbn:se:bth-7993ISI: 000270612000131Local ID: oai:bth.se:forskinfo0E62E1F39B133E32C1257619002C9345ISBN: 978-1-4244-3572-2 (print)OAI: oai:DiVA.org:bth-7993DiVA: diva2:835676
Conference
The Fourth International Conference on Availability, Reliability and Security (ARES 2009)
Available from: 2012-09-18 Created: 2009-08-21 Last updated: 2015-06-30Bibliographically approved

Open Access in DiVA

No full text

Search in DiVA

By author/editor
Fiedler, Markus
TelecommunicationsHuman Aspects of ICT

Search outside of DiVA

GoogleGoogle Scholar

Total: 79 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf