Preview

Security Issues with IP Multimedia Subsystem

Powerful Essays
Open Document
Open Document
3020 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Issues with IP Multimedia Subsystem
Security Issues with IP Multimedia Subsystem (IMS)
A Review Paper

Prepared By
Muhammad Tayyab
2010-ag-1604

Supervised by
Ahmad Mateen
Salman Afsar
Computer Science Dept.
University of Agriculture Faisalabad

Security Issues with IP Multimedia Subsystem (IMS)

Abstract
IMS started as a technology for 3rd Generation mobile networks (under the auspices of the 3rd Generation Partnership Project (3GPP), but it is now spreading to next generation wire line networks and is going to be a key to Fixed Mobile Convergence (FMC). It builds upon Session Initiation Protocol (SIP) which has emerged as the crucial technology for controlling communications in IP-based next generation networks (NGN).
IMS is about services and applications, enabling service providers to offer rich multimedia services across wireless, packet and traditional circuit switched networks. It is standards based and uses open interfaces and functional components that can be assembled flexibly into hardware and software systems to support real-time interactive services and applications. This paper provides you the overview of IMS architecture and its security challenges.

Introduction
The basic set of standards for IMS implementation were released in 2004 and the first implementations are beginning in the European wireless markets. The standards organizations are heavily involved in developing standards to fill inevitable gaps and to add new capabilities. However IMS is still untested in real-life major carrier networks and its wide scale implementation are some years away. ITU-T definition: NGN is a packet based network able to provide services incl. telecom Services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies. It offers unrestricted access by users to different service providers and generalized mobility.



References: [1] http://www.gtisc.gatech.edu/pdf/imswp.pdf [2] 3GPP. Security architecture. [3] 3GPP. Security aspects of early IP multimedia subsystem (IMS) (release 7). Technical Report TS 33.978 V7.0.0, June 2007. [4] http://en.wikipedia.org/wiki/IP_Multimedia_Subsystem

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3230 Lab 7 Multi-Factor Authentication Process Chris Wiginton ITT Technical Institute, Tampa FL Instructor: David Marquez 1 May 2014 Multi-Factor Authentication Process Area Authentication Process(es) Authentication Factors Authentication and Authorization LDAP /Kerberos Authentication, Token , Session Timeline Username , Password Token, Pin, Biometric Device Support Device should not be end of life and under support contract Vendor Supported Firewalls using Approved Product List (APL) Interoperability ISO and IEEE Standards for Encryption Multi-Vendor Interoperability based on AES, 3DES Standards, and SSL Encryption methods. Multiprotocol Support TCP, UDP, ESP, SSL ACL only allows trusted endpoints based on Port and Protocol Packet Encryption IKE - Internet Key Exchange VPN 2 Phase Negotiation based on Pre-Share Key, VPN Certificate Authentication.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2415 Words
    • 10 Pages

    A 4G system is expected to provide a communication technology based on Internet Protocol. Internet protocol or IP is generally used in the computer networks for data communication among computers. All the devices are identified by a number called IP number. In 4G network this concept is extended to telephony with an intention to make data and voice communication integrated in the same architecture. The 4G network is supposed to facilitate a Gigabit speed i.e. a speed of 100+ Mega Bytes per second with a mobile node speed of up to 200km/hr. It will enable Internet access, IP…

    • 2415 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 5 Lab 1 Answers

    • 4778 Words
    • 20 Pages

    Internetworking Basics Internetworking Models The OSI Reference Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 1.1 Answers to Written Lab 1.2 Answers to Written Lab 1.3…

    • 4778 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    The Session Initiation Protocol (SIP), is an application level signaling protocol for setting up, modifying, and terminating real-time sessions between participants over an IP data network. Fifth Main Bank can use SIP technology to support any type of single-media or multi-media session, including teleconferencing. The key driving force behind SIP technology is to enable Internet telephony, also referred to as Voice over IP (VoIP.) Using Real-Time Transport Protocol (RTP), Fifth Main Bank can exchange audio, video, or other multimedia content between session participants.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    References: Gilbert, H. (1995). Introdcution to TCP/IP. Retrieved April 6, 2008, from Yale.edu Web site: http://www.yale.edu/pclt/COMM/TCPIP.HTM…

    • 2834 Words
    • 12 Pages
    Best Essays
  • Good Essays

    The Union had many advantages during the Civil War. The Union had leaders that were far more valuable than the ones that the Confederacy had. The valuable leaders that the Union had possessed were Ulysses S. Grant, Philip Sheridan, and Abraham Lincoln. The Union was in the middle of an industrial revolution at the same time as the Civil War which meant that they had a booming economy. The Union had organized banks and had easy access to the supplies that they had needed.…

    • 451 Words
    • 2 Pages
    Good Essays
  • Good Essays

    They are an attractive media because require no physical "wire" to be installed, can penetrate walls, provide connectivity to a mobile user, and can potentially carry a signal for long distances. The characteristics a radio channel depend significantly on the propagation environment and the distance over which a signal is to be carried. Environmental considerations determine path loss and shadow fading (which decrease in signal strength as it travels over a distance and around/through obstructing objects), multipath fading (due to signal reflection off of interfering objects), and interference (due to other radio channels or electromagnetic signals).…

    • 25392 Words
    • 102 Pages
    Good Essays
  • Good Essays

    Understanding a SIP Trunk

    • 511 Words
    • 3 Pages

    Session Initiation Protocol (SIP) is used to initiate and manage Voice over IP (VoIP) communications sessions for basic telephone service and for additional real-time communication services, such as instant messaging, conferencing, presence detection, and multimedia. This section provides planning information for implementing SIP trunks, a type of SIP connection that extends beyond the boundary of your local network.…

    • 511 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The United States has the highest rate of civilian gun ownership in the world. That also comes with having the most mass shootings even rivaling war-torn countries. In 2015 only there has been more than three hundred plus mass shootings. With more shootings happening a lot more frequently, it is apparent that not nearly enough background checks into gun owners are being run. Three-quarters of people either own two or more. But what should be done about those who are attempted buyers that are turned away? Implemented in 1998 and Created under the Brady Handgun Violence Prevention Act, the National Instant Criminal Background Check System allows licensed gun sellers to check with the Federal Bureau of Intelligence, as required by the law, before a sale is made. While background checks have prevented tens of thousands of unlawful gun sales each year, opponents have said that the government doesn’t prosecute enough of the attempted buyers (‘‘The Case against Gun Background Checks’’, Good). More than 76,000 denials for gun purchases in 2010. 62 people were referred for prosecution and only thirteen of said prosecutions resulted in verdicts or guilty pleas. Some feel like there are already enough gun laws and that there…

    • 421 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Ir At Verizon Essay

    • 699 Words
    • 3 Pages

    to the Session Initiation Protocol (SIP), an important standard for setting up calls and other…

    • 699 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The Open Systems Interconnect (OSI) model is a standard reference model for the communication between two end users. Seven different layers make up the OSI model: physical, data link, network, transport, session, presentation, and application. This paper will cover the type of security that is associated with each level of the OSI model.…

    • 1615 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    School Uniforms

    • 1732 Words
    • 7 Pages

    The issue of school uniforms in today’s public schools is a silent but very controversial issue, Gaining momentum with school administrators and parents debating on whether or not to convert their public schools. With academics on a decline compared to the world average, (Wu, Elaine) along with school violence at its highest that it has ever been. The United States is a seeing a change towards school using school uniforms to help solve many problems associated with public schools.…

    • 1732 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    H.248

    • 1286 Words
    • 6 Pages

    H.248 and MeGaCo refer to the same kind of protocol. It is an achievement from the efforts of both ITU and IETF. It is named H.248 by ITU-T and MeGaCo by IETF. H.248 comes into being on the basis of MGCP and is combined with features of other media gateway control associated protocols. The function structure of H.248 is similar to that of MGCP. In NGN, both H.248 and MGCP can be used between SoftX and most components. MGCP is deficient in its descriptive capability, which restricts its applications in large gateways. For those large-scaled gateways, H.248 is a much better choice. MGCP message transportation depends on UDP packets over IP network, and H.248 signaling messages may be based on multiple bearers such as UDP/TCP/SCTP.…

    • 1286 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    iperf3 -s -p 5555: On execution of this command, the host is prompted to run on server mode and the server is made to listen or connect to port number 5555.…

    • 1371 Words
    • 8 Pages
    Satisfactory Essays