
PCSCF to set up the lifetime of the SA. Therefore,
the lifetime of SA should be smaller than the validity
period of both Cert
HP
and the CRL. Otherwise, SA
would be invalid when one of the two certificates be-
comes invalid. In this case, a request for a certificate
renewal or a new CRL should be sent.
After the determination of the SA lifetime, the
PCSCF computes a symmetric key, signs it and en-
crypts it with the public key of the MS. Then it
sends message rM
6
to the MS in which it defines the
SAs. rM
6
would include the chosen security mecha-
nisms, the certificate Cert
HP
, the lifetime of the SA
and the symmetric session key. To ensure the secu-
rity of the SA, the two latter parameters should be
sent signed and encrypted. In addition, the PCSCF
sends a request req
i
to MS. When receiving rM
6
, the
MS authenticates the PCSCF with the verification of
Cert
HP
. Then, it stores the parameters of the SA to
be used on the following messages. Furthermore, MS
computes the response res
i
and sends it to the PCSCF
to accomplish the SA setup procedure.
Managing SAs between MS and SCSCF. To pro-
vide an end to end security between the MS and the
SCSCF, new SA should be established between these
two entities. The definition of these SAs allows the
protection of all kinds of access to the services in-
dependently of the access network. Even if there is
a security weakness on the communication links, the
SCSCF could verify, and no longer delegate, the in-
tegrity and confidentiality of the messages sent by
MS. In this case, SAs are defined between the MS,
which is defined by its public identity IM P U and
by its IP address, and the SCSCF defined by its IP
address. The selection of the security mechanisms
(e.g., authentication, integrity and confidentiality) to
be used/declared in SAs is done during the registra-
tion process. In fact, the MS sends with message M
1
the lists of its supported security mechanisms, the in-
dex of its security association, its identity certificate
and its root certificate. Based on M
1
, the SCSCF de-
termines the mechanisms that it would deploy. Then,
it authenticates the MS through the verification of its
private identity and its identity certificate in the rel-
ative HSS. After that, the SCSCF use the CRL and
the validity period of the Cert
HS
to deduce the life-
time of the security association such as it will have the
smallest value. Next, the SCSCF chooses an authenti-
cation vector AV
i
and extracts RAN D
i
and AUT N
i
.
These parameters would allow the MS to compute the
integrity and the confidentiality keys IK
i
and CK
i
.
Finally, the SCSCF sends the previous indicated pa-
rameters to the MS in message M
9
. On the other side,
the MS would verify the freshness of the message and
the identity of the SCSCF. Then, it computes RES
i
,
IK
i
and CK
i
. Next, the response of the MS (using
message M
12
) will confirm the choices indicated in
the SA.
To resume, one can note that the keys and the pa-
rameters defined in each security association are those
existing in the authentication vectors delivered by the
HSS to the SCSCF. Therefore, every authentication
vector contributes to the definition of a security asso-
ciation. The lifetime of the SAs defined both in the
MS and in the SCSCF are specified to be longer than
the lifetime of the registration. Thus, the request for
re-registration is protected by the security association
yet established. After the definition of the two SAs,
the next sub-section will consider the mechanisms of
protection of the SA databases.
3.2 The protection of the security
associations
The security associations previously defined are
stored in specific data bases (SADB). The protection
of these databases needs in addition to a secured hard
storage an enforcement of some appropriate protec-
tion. Thus, we propose the definition of two types of
SADBs:
• the first contains the list of SAs established at a
defined moment. It can include SAs established be-
tween the MS and the SCSCF:
SA# Source
Address
Destination
Address
Encryption
algo
Auth
Algo
Integrity
Algo
Ptr# rule#
• the second contains the security policies defined be-
tween the different operators (e. g. between the SC-
SCF and the HSS).
Rule# Source Ad-
dress
Destination
Address
Encryption
algo
Authentication
algo
Integrity Algo
The use of these databases ensures more protec-
tion of the SAs, since there is a continuous verifica-
tion of the conformity of a security association to the
rules defined between two different operators. Fur-
thermore, this approach can offer security as a quality
of service given to the subscribers according to the
agreements defined between the HSS and the SCSCF.
4 SPUR ANALYSIS
In this section, the most important SPUR provisions
are quoted. Furthermore, a comparison between the
security mechanisms defined respectively in the 3GPP
protocol and the SPUR is presented.
ICETE 2004 - WIRELESS COMMUNICATION SYSTEMS AND NETWORKS
12