Security Issues with IP Multimedia Subsystem

Powerful Essays
Topics:
Security Issues with IP Multimedia Subsystem (IMS)
A Review Paper

Prepared By
Muhammad Tayyab
2010-ag-1604

Supervised by
Ahmad Mateen
Salman Afsar
Computer Science Dept.
University of Agriculture Faisalabad

Security Issues with IP Multimedia Subsystem (IMS)

Abstract
IMS started as a technology for 3rd Generation mobile networks (under the auspices of the 3rd Generation Partnership Project (3GPP), but it is now spreading to next generation wire line networks and is going to be a key to Fixed Mobile Convergence (FMC). It builds upon Session Initiation Protocol (SIP) which has emerged as the crucial technology for controlling communications in IP-based next generation networks (NGN).
IMS is about services and applications, enabling service providers to offer rich multimedia services across wireless, packet and traditional circuit switched networks. It is standards based and uses open interfaces and functional components that can be assembled flexibly into hardware and software systems to support real-time interactive services and applications. This paper provides you the overview of IMS architecture and its security challenges.

Introduction
The basic set of standards for IMS implementation were released in 2004 and the first implementations are beginning in the European wireless markets. The standards organizations are heavily involved in developing standards to fill inevitable gaps and to add new capabilities. However IMS is still untested in real-life major carrier networks and its wide scale implementation are some years away. ITU-T definition: NGN is a packet based network able to provide services incl. telecom Services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies. It offers unrestricted access by users to different service providers and generalized mobility.



References: [1] http://www.gtisc.gatech.edu/pdf/imswp.pdf [2] 3GPP. Security architecture. [3] 3GPP. Security aspects of early IP multimedia subsystem (IMS) (release 7). Technical Report TS 33.978 V7.0.0, June 2007. [4] http://en.wikipedia.org/wiki/IP_Multimedia_Subsystem

You May Also Find These Documents Helpful

  • Powerful Essays

    Legal Issues in Multimedia

    • 1521 Words
    • 7 Pages

    Topic: Legal Issues in Multimedia Introductory Nowadays, these resources have been illegible used by many people without knows by the original maker. People who used or copy other people media works is one of the illegible law of Multimedia that frequently happens. All of Multimedia product must be copyrighted and most of them already have it, but it was very disappointed because the product is originally implemented wrongly and without permission by the original makers. Leone Woodcock (2000)…

    • 1521 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Subsystems of a Spacecraft Spacecrafts have become the latest buzz in the world of science and engineering. Engineers are everyday carrying out numerous experiments and analyses to design some new spacecrafts that can help humans explore the world outside the planet earth in an easier way. Designing spacecrafts is like a dream for all the aeronautical engineers all over the world. The making of these equipments requires the involvement of several different engineering fields together, including…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security Issues

    • 291 Words
    • 2 Pages

    Name: Joseph Odechie Bossman class: 2011 MIS Course: Operating Systems (Aelaf Dafla) Article Title: When a security Breach hits Home. By Steve Fox. The article talks about the most unexpected of data breaches. Mostly in cyber crime, data-thieves, target large-scale networks as a means of hijacking important information about credit card numbers of customers or other bank details. However, in this situation, the on-campus clinic database of UC Berkeley (University of California) was breached…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Security Issues

    • 567 Words
    • 3 Pages

    Security is the number one concern in the information technology world. As the 21st century evolves the technology advances with it as well. Information Security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. It revolves around maintaining three basic concepts of information—confidentiality, integrity, and availability. Other basic concepts such as: nonrepudiation, authentication and authorization relate…

    • 567 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IP Routing security concerns and countermeasures Patrick Kilensel Information Security Analyst at FORUS IP Routing security concerns and countermeasures Table of Contents Introduction ...................................................................................................... 4 1.1 Concerns around the securit y of the Internet .......................................... 4 1.2. Short discussion about IP Routing ................................................................ 5…

    • 5094 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Mississippian Subsystem

    • 362 Words
    • 2 Pages

    The type region for the Mississippian Subsystem lies in the central Mississippi Valley of the United States. Most of the formations representing the type sequence are found in Missouri, Iowa, and Illinois. The Kinderhookian Series includes the Hannibal Formation and the Chouteau Group. It is succeeded by the Osagean Series, which includes the Burlington Limestone and overlying Keokuk Limestone. The Meramecan and Chesterian Series overlie previous layers. Other well-known Mississippian units in North…

    • 362 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Multimedia

    • 2198 Words
    • 9 Pages

    Multimedia is media and content and content that uses a combination of different content forms. This contrasts with media that use only rudimentary computer displays such as text-only or traditional forms of printed or hand-produced material. Multimedia includes a combination of text, audio, still images, animation, video, or interactivity content forms. Multimedia is usually recorded and played, displayed, or accessed by information content processing devices, such as computerized and electronic…

    • 2198 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Multimedia

    • 2431 Words
    • 10 Pages

    MULTIMEDIA Multimedia is media and content that uses a combination of different content forms. This contrasts with media that use only rudimentary computer displays such as text-only or traditional forms of printed or hand-produced material. Multimedia includes a combination of text, audio, still images, animation, video, or interactivity content forms. Multimedia is usually recorded and played, displayed, or accessed by information content processing devices, such as computerized and electronic…

    • 2431 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    Multimedia

    • 1216 Words
    • 5 Pages

    Introduction to Multimedia Contents 1.0 Aims and Objectives 1.1 Introduction 1.2 Elements of Multimedia System 1.3 Categories of Multimedia. 1.4 Features of Multimedia 1.5 Applications of Multimedia System. 1.6 Convergence of Multimedia System. 1.7 Stages of Multimedia Application Development 1.8 Let us sum up. 1.9 Lesson-end activities 1.10 Model answers to “Check your progress” 1.11 References 1.0 Aims and Objectives In this lesson we will learn the preliminary concepts of Multimedia. We will…

    • 1216 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Ipv6 Security Issues

    • 3070 Words
    • 13 Pages

    IPv6 Security Issues Internet Protocol v6 (IPv6) is replacing Internet Protocol v4 (IPv4). The need for IPv6 has risen to the forefront due to the depletion of IPv4 addresses. Security concerns and issues have slowed the adoption of the new protocol. Trade information is readily available for IPv6. A simple web search on the topic will lead you to trade magazine articles, books, white paper and even the government agency recommendations. The marketplace is brimming with “solutions” to IPv6 security…

    • 3070 Words
    • 13 Pages
    Best Essays