Preview

Security Issues with IP Multimedia Subsystem

Powerful Essays
Open Document
Open Document
3020 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Issues with IP Multimedia Subsystem
Security Issues with IP Multimedia Subsystem (IMS)
A Review Paper

Prepared By
Muhammad Tayyab
2010-ag-1604

Supervised by
Ahmad Mateen
Salman Afsar
Computer Science Dept.
University of Agriculture Faisalabad

Security Issues with IP Multimedia Subsystem (IMS)

Abstract
IMS started as a technology for 3rd Generation mobile networks (under the auspices of the 3rd Generation Partnership Project (3GPP), but it is now spreading to next generation wire line networks and is going to be a key to Fixed Mobile Convergence (FMC). It builds upon Session Initiation Protocol (SIP) which has emerged as the crucial technology for controlling communications in IP-based next generation networks (NGN).
IMS is about services and applications, enabling service providers to offer rich multimedia services across wireless, packet and traditional circuit switched networks. It is standards based and uses open interfaces and functional components that can be assembled flexibly into hardware and software systems to support real-time interactive services and applications. This paper provides you the overview of IMS architecture and its security challenges.

Introduction
The basic set of standards for IMS implementation were released in 2004 and the first implementations are beginning in the European wireless markets. The standards organizations are heavily involved in developing standards to fill inevitable gaps and to add new capabilities. However IMS is still untested in real-life major carrier networks and its wide scale implementation are some years away. ITU-T definition: NGN is a packet based network able to provide services incl. telecom Services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies. It offers unrestricted access by users to different service providers and generalized mobility.



References: [1] http://www.gtisc.gatech.edu/pdf/imswp.pdf [2] 3GPP. Security architecture. [3] 3GPP. Security aspects of early IP multimedia subsystem (IMS) (release 7). Technical Report TS 33.978 V7.0.0, June 2007. [4] http://en.wikipedia.org/wiki/IP_Multimedia_Subsystem

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Router Management Out-of-Band Management Username and Password Authentication. Traffic VPN and Tunnel Based Traffic ACL and Tunnel Traffic Established Between Trusted End Points. UDP and TCP Protocol Enforcement with Stateful Firewall Access list Source and Destination, Address and Session established with Layer 7 Firewall Protection.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2415 Words
    • 10 Pages

    A 4G system is expected to provide a communication technology based on Internet Protocol. Internet protocol or IP is generally used in the computer networks for data communication among computers. All the devices are identified by a number called IP number. In 4G network this concept is extended to telephony with an intention to make data and voice communication integrated in the same architecture. The 4G network is supposed to facilitate a Gigabit speed i.e. a speed of 100+ Mega Bytes per second with a mobile node speed of up to 200km/hr. It will enable Internet access, IP…

    • 2415 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    The Session Initiation Protocol (SIP), is an application level signaling protocol for setting up, modifying, and terminating real-time sessions between participants over an IP data network. Fifth Main Bank can use SIP technology to support any type of single-media or multi-media session, including teleconferencing. The key driving force behind SIP technology is to enable Internet telephony, also referred to as Voice over IP (VoIP.) Using Real-Time Transport Protocol (RTP), Fifth Main Bank can exchange audio, video, or other multimedia content between session participants.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 5 Lab 1 Answers

    • 4778 Words
    • 20 Pages

    Internetworking Basics Internetworking Models The OSI Reference Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 1.1 Answers to Written Lab 1.2 Answers to Written Lab 1.3…

    • 4778 Words
    • 20 Pages
    Powerful Essays
  • Best Essays

    Tomsho, G., Tittel, E., & Johnson, D. (2004). Guide to Networking Essentials, 4th Edition. Boston, MA: Course Technology. Retrieved March 18, 2008, from University of Phoenix, rEsource, NTC360—Network & Telecommunications Concepts Course Web site.…

    • 2834 Words
    • 12 Pages
    Best Essays
  • Good Essays

    They are an attractive media because require no physical "wire" to be installed, can penetrate walls, provide connectivity to a mobile user, and can potentially carry a signal for long distances. The characteristics a radio channel depend significantly on the propagation environment and the distance over which a signal is to be carried. Environmental considerations determine path loss and shadow fading (which decrease in signal strength as it travels over a distance and around/through obstructing objects), multipath fading (due to signal reflection off of interfering objects), and interference (due to other radio channels or electromagnetic signals).…

    • 25392 Words
    • 102 Pages
    Good Essays
  • Satisfactory Essays

    Simple Pricing

    • 488 Words
    • 2 Pages

    „I-mode” has been extraordinarily successful in Japan. This is because of its outstanding convenience and it's unique business model. Its reliance on this system offers an innovative approach to the mobile service value chain and to wireless service / Internet relationships.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Understanding a SIP Trunk

    • 511 Words
    • 3 Pages

    Session Initiation Protocol (SIP) is used to initiate and manage Voice over IP (VoIP) communications sessions for basic telephone service and for additional real-time communication services, such as instant messaging, conferencing, presence detection, and multimedia. This section provides planning information for implementing SIP trunks, a type of SIP connection that extends beyond the boundary of your local network.…

    • 511 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Telstra

    • 3989 Words
    • 16 Pages

    Department of Broadband, Communication and Digital Economy (DBCDE), 2012, What is the National Broadband Network?, NBN, accessed 15 September 2012,…

    • 3989 Words
    • 16 Pages
    Best Essays
  • Good Essays

    Ir At Verizon Essay

    • 699 Words
    • 3 Pages

    to the Session Initiation Protocol (SIP), an important standard for setting up calls and other…

    • 699 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    The Open Systems Interconnect (OSI) model is a standard reference model for the communication between two end users. Seven different layers make up the OSI model: physical, data link, network, transport, session, presentation, and application. This paper will cover the type of security that is associated with each level of the OSI model.…

    • 1615 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Two of the biggest threats to the data link layer have to deal with ARP and the process of wardriving. ARP is the protocol that maps an IP address to a physical address or MAC address within the network. ARP is a simple protocol that was never designed for authentication. Any end station that has…

    • 1387 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    H.248

    • 1286 Words
    • 6 Pages

    H.248 and MeGaCo refer to the same kind of protocol. It is an achievement from the efforts of both ITU and IETF. It is named H.248 by ITU-T and MeGaCo by IETF. H.248 comes into being on the basis of MGCP and is combined with features of other media gateway control associated protocols. The function structure of H.248 is similar to that of MGCP. In NGN, both H.248 and MGCP can be used between SoftX and most components. MGCP is deficient in its descriptive capability, which restricts its applications in large gateways. For those large-scaled gateways, H.248 is a much better choice. MGCP message transportation depends on UDP packets over IP network, and H.248 signaling messages may be based on multiple bearers such as UDP/TCP/SCTP.…

    • 1286 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    iperf3 -s -p 5555: On execution of this command, the host is prompted to run on server mode and the server is made to listen or connect to port number 5555.…

    • 1371 Words
    • 8 Pages
    Satisfactory Essays