The IP Multimedia Subsystem

2487 Words5 Pages

Abstract-The IP multimedia subsystem (IMS) is a Next Generation Network (NGN) that integrates wireless, wireline and internet technologies. IMS enables the convergence of voice, data, and multimedia services such as Voice over IP (VoIP), Video over IP, push-to-talk, presence or instant messaging services. IMS is almost independent of the access technology and uses a number of protocols such as HTTP and SMTP while the most important one is called SIP or session Initiation Protocol. At parallel this open based emerging technology has security challenges from multiple communication protocols like IP, SIP and RTP etc. Because of the nature of the IMS (IP based), these networks will inherit most of the security threats that these protocols are currently facing. In this paper we have presented a security model to protect IMS resources from different attacks like session teardown attack, session modification attack and media flow attack. Also authorization module is proposed to protect IMS resources against unauthorized access. All of these affect the IMS value added services.

Keywords: Next Generation Networks, IP Multimedia Subsystem, IMS Security, Security threats, Intrusion Detection & Prevention System, Authorization

I. INTRODUCTION

The IP Multimedia Subsystem (IMS) provides a powerful framework for the deployment of Next Generation Networks (NGN). The IP Multimedia Subsystem standardized by the 3rd generation partnership project (3GPP) and 3GPP2 [1] is a technology that merges both the cellular and internet technologies. IMS is a packet switched and IP based network which provides the users to receive a wide range of multimedia services such as audio, video and data over a single IP network. As IP based networks have open an...

... middle of paper ...

...04.

[7] D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambbrinoudakis, S. Gritizalis, S. Ehlert, D. Sisalem, “Survey of Security Vulnerabilities in SIP Protocol”, IEEE Communication Surveys Volume 8, No.3 ISBN 1553-877X, pp 68-81 (2006).

[9] V.Gurbani, A.Jeffrey, draft-gurbani-sip-tls-use-00: “The Use of Transport Layer Security (TLS) in the Session Initiation Protocol (SIP)”, February 2006.

[10] 3GPP, “Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) (Release 7), TS 33.220 V7 (2005).

[11] 3GPP, “Generic Authentication Architecture (GAA); Access to Network Application Functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) (Rel.7)”, TS 33.222 V7 (2005).

[12] S. Bellovin, J. Ioannidis, A. Keromytis, R. Stewart,“On the Use of Stream Control Transmission Protocol (SCTP) with IPSec”, RFC 3554 (2003).

Open Document