Trust Management Approach for Securing the Services Access:Telecom Operators Collaborations in IMS Network

Authors

  • Nawal Ait Aali Laboratory of Telecommunications Systems, Networks and Services National Institute of Posts and Telecommunications (INPT), Rabat, Morocco
  • Amine Baina Laboratory of Telecommunications Systems, Networks and Services National Institute of Posts and Telecommunications (INPT), Rabat, Morocco
  • Loubna Echabbi Laboratory of Telecommunications Systems, Networks and Services National Institute of Posts and Telecommunications (INPT), Rabat, Morocco

Keywords:

IMS network, trust management, collaboration, trust criteria, privacy, telecom operator, service provider, decision making, AHP

Abstract

IP Multimedia Subsystem (IMS) network presents a new generation in the telecommunication infrastructure by providing a variety of services whatever the used technologies. Therefore, to make the customers satisfied, their telecom operator provides them several services according to their attached user profile (subscription type). However, some services are not hosted by the home operator; the service providers are responsible to present these services to the customers. In this case, the operator contacts the concerned provider for requesting the access to the desired services. In fact, this access may arise some security issues which affect the customer privacy and the services security. In this paper,we project our approach, Tr-OrBAC, in the context of collaboration between service providers and telecom operators.We discuss the case when the customer wishes to access to a service hosted by an external service provider. We present the encountered security problems. Then, we depict and we detail the functioning of our approach to resolve these problems.

 

Downloads

Download data is not yet available.

References

R. Ratasuk, A. Prasad, Z. Li, A. Ghosh and M. A. Uusitalo, ‘Recent

advancements in M2M communications in 4G networks and evolution

towards 5G’, in 18th International Conference on Intelligence in Next

Generation Networks, pp. 52–57, 2015.

T. Pfeiffer, ‘Next Generation Mobile Fronthaul Architectures’, in Optical

Fiber Communication Conference and Exhibition, Los Angeles, CA,

USA, 2015.

N. Czernich, O. Falck, T. Kretschmer and L. Woessmann, ‘Broadband

Infrastructure and Economic Growth*: Broadband Infrastructure

and Economic Growth’, The Economic Journal, vol. 121, no 552, pp.

–532, 2011.

D. He, C. Chen, J. Bu, S. Chan and Y. Zhang, ‘Security and efficiency

in roaming services for wireless networks: challenges, approaches, and

prospects’, IEEE Communication Magazine, vol. 51, no 2, pp. 142–150,

Camarillo, Gonzalo and Miguel-Angel Garcia-Martin, ‘The 3G IP

multimedia subsystem (IMS): merging the Internet and the cellular

worlds’ JohnWiley & Sons, 2007.

Scott,W. Richard, Gerald F. Davis et al., “Organizations and organizing:

Rational natural and open systems perspectives”, Routledge, 2015.

N. Ait Aali, A. Baina and L. Echabbi, ‘Tr-OrBAC: A trust model for

collaborative systems within critical infrastructures’, 5thWorld Congress

on Information and Communication Technologies (WICT), pp. 123–128,

C. Alcaraz and S. Zeadally, ‘Critical infrastructure protection:

Requirements and challenges for the 21st century’, International Journal

of Critical Infrastructure Protection, vol. 8, pp. 53–66, 2015.

E. Belmekki, M. Bellafkih and N. Bouaouda, ‘Efficient light model for

securing IMS network’, in 8th International Conference on Intelligent

Systems: Theories and Applications (SITA), pp. 1–7, 2013.

N. Ait Aali, A. Baina and L. Echabbi, ‘Trust Management in Collaborative

Systems for Critical Infrastructure Protection’, Security and

Communication Network, vol. 2018, p. 1–15, juillet. 2018.

R. S. Sandhu, E. J. Coyne, H. L. Feinstein and C. E.Youman, ‘Role-based

access control models’, Computer, vol. 29, no 2, pp. 38–47, 1996.

N. Ait Aali, Y. E. B. E. Idrissi, A. Baina and L. Echabbi, ‘Collaboration

decision making based on AHP method in Tr-OrBAC model: Case

study’, in 4th IEEE International Colloquium on Information Science

and Technology (CiSt), pp. 779–784, 2016.

V. Herrera-Semenets, O. A. P´erez-Garc´ıa, A. Gago-Alonso and

R. Hern´andez-Le´on, ‘Classification rule-based models for malicious

activity detection’, Intelligent Data Analysis, vol. 21, no 5, pp. 1141–

, 2017.

F. Ishmanov,A. S. Malik, S.W. Kim and B. Begalov, ‘Trust management

system in wireless sensor networks: design considerations and research

challenges’, Transactions on Emerging Telecommunications Technologies,

vol. 26, no 2, pp. 107–130, 2015.

A. Chen, N. Feamster and E. Calandro, ‘Exploring the walled garden

theory: An empirical framework to assess pricing effects on mobile data

usage’, Telecommunications Policy, vol. 41, no 7, pp. 587–599, 2017.

N.-V. Ciobanu, D.-G. Comaneci, C. Dobre, C. X. Mavromoustakis and

G. Mastorakis, ‘OpenMobs: Mobile Broadband Internet Connection

Sharing’, in Mobile Networks and Management, pp. 244–258, 2014.

D. Kang Y. Park, ‘Review-based measurement of customer satisfaction

in mobile service: Sentiment analysis and VIKOR approach’, Expert

Systems with Applications, vol. 41, no 4, pp. 1041–1050, 2014.

T. L. Saaty, ‘Decision making with the analytic hierarchy process’,

International Journal of Services Sciences., vol. 1, no 1, pp. 83–98, 2008.

A. A. E. Kalam et al., ‘Organization based access control’, in

th International Workshop on Policies for Distributed Systems and

Networks, pp. 120–131, 2003.

A. S. Y. Cheung, ‘Location privacy: The challenges of mobile service

devices’, Computer Law & Security Review, vol. 30, no 1, pp. 41–54,

K. Toumi, C. Andr´es and A. Cavalli, ‘Trust-orBAC: A Trust Access

Control Model in Multi-Organization Environments’, in Information

Systems Security, V. Venkatakrishnan and D. Goswami, ´ Ed. Springer

Berlin Heidelberg, 2012, pp. 89–103.

S. Ruohomaa and L. Kutvonen, ‘Trust management survey’, in Trust

Management, Springer, 2005, pp. 77–92.

Y. E. B. El Idrissi, R. Ajhoun and M. J. Idrissi, ‘Multicriteria-Based

Decision for Services Discovery and Selection’, in Intelligent Interactive

Multimedia Systems and Services, Springer, pp. 41–51, 2010.

G. Is¸iklar and G. B¨uy¨uk¨ozkan, ‘Using a multi-criteria decision making

approach to evaluate mobile phone alternatives’, Computer Standards &

Interfaces, vol. 29, no 2, pp. 265–274, 2007.

M. Maachaoui, ‘S´ecurit´e et performances des r´eseaux de nouvelle

g´en´eration’, 12-juin-2015. [En ligne]. Disponible sur: http://ethesis.inptoulouse.

fr/archive/00002996/.

Downloads

Published

2019-09-27

How to Cite

Aali, N. A., Baina, A., & Echabbi, L. (2019). Trust Management Approach for Securing the Services Access:Telecom Operators Collaborations in IMS Network. Journal of Mobile Multimedia, 15(1-2), 51–70. Retrieved from https://journals.riverpublishers.com/index.php/JMM/article/view/4421

Issue

Section

Articles