Security Issues with IP Multimedia Subsystem

Topics: Session Initiation Protocol, IP Multimedia Subsystem, Packet switching Pages: 10 (3020 words) Published: July 25, 2012
Security Issues with IP Multimedia Subsystem (IMS)
A Review Paper

Prepared By
Muhammad Tayyab

Supervised by
Ahmad Mateen
Salman Afsar
Computer Science Dept.
University of Agriculture Faisalabad

Security Issues with IP Multimedia Subsystem (IMS)

IMS started as a technology for 3rd Generation mobile networks (under the auspices of the 3rd Generation Partnership Project (3GPP), but it is now spreading to next generation wire line networks and is going to be a key to Fixed Mobile Convergence (FMC). It builds upon Session Initiation Protocol (SIP) which has emerged as the crucial technology for controlling communications in IP-based next generation networks (NGN). IMS is about services and applications, enabling service providers to offer rich multimedia services across wireless, packet and traditional circuit switched networks. It is standards based and uses open interfaces and functional components that can be assembled flexibly into hardware and software systems to support real-time interactive services and applications. This paper provides you the overview of IMS architecture and its security challenges.

The basic set of standards for IMS implementation were released in 2004 and the first implementations are beginning in the European wireless markets. The standards organizations are heavily involved in developing standards to fill inevitable gaps and to add new capabilities. However IMS is still untested in real-life major carrier networks and its wide scale implementation are some years away. ITU-T definition: NGN is a packet based network able to provide services incl. telecom Services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies. It offers unrestricted access by users to different service providers and generalized mobility. IMS comes from the need to evolve the TDM networks into robust, extensible networks that can take advantage of emerging technologies. The migration from circuit switching to packet switching has played a significant role in the maturation of data networking. Taking advantage of these same concepts, the voice network can evolve into a multimedia network that allows the combination and coordination of voice, video and data (sometimes called the Triple Play). The drivers have to be business driven. In the wire line networks there is a need to increase bandwidths offered to users and replace the outdated TDM switches. In wireless networks one clear driver is the ability to introduce services rapidly and uniformly. All services should be available to the user whether within the home network or roaming to another network.IMS provides the architectural umbrella for wireline and wireless convergence. This White paper helps you to provide the overview of IP Multimedia Subsystem and security challenges which is faces by the IMS users and Network Providers.

Overview of IMS Architecture
The IMS is being developed as the next generation core architecture for converged voice and data services. While it was originally intended for 3GPP wireless, IMS has evolved to include multiple access technologies and is the basis for planned converged network services including both wireless and wired access. IMS is basically a network architecture consisting of an IP-based core network connected to multiple access networks to provide a converged service to wireless,wireline and cable subscribers. IMS has established itself as a foundation for future wireless and wireline convergence. It provides an opportunity to build an open IP based service platform that will enable an easy and efficient deployment of new multimedia communication services mixing telecom and data services. One thing which really makes a difference is that a common IMS based service platform can be used to serve various...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • multimedia Essay
  • Security Issues in Cloud Computing Essay
  • Handling Security And Ethical Issues IT Essay
  • Essay on Security Issues for Voice over Ip Systems
  • Ipv6 Security Issues Essay
  • Legal Issues in Multimedia Essay
  • Web Security Issues Essay
  • Essay about Riordan Security Issues

Become a StudyMode Member

Sign Up - It's Free