Essay on The IP Multimedia Subsystem

2477 Words10 Pages
Abstract-The IP multimedia subsystem (IMS) is a Next Generation Network (NGN) that integrates wireless, wireline and internet technologies. IMS enables the convergence of voice, data, and multimedia services such as Voice over IP (VoIP), Video over IP, push-to-talk, presence or instant messaging services. IMS is almost independent of the access technology and uses a number of protocols such as HTTP and SMTP while the most important one is called SIP or session Initiation Protocol. At parallel this open based emerging technology has security challenges from multiple communication protocols like IP, SIP and RTP etc. Because of the nature of the IMS (IP based), these networks will inherit most of the security threats that these protocols are…show more content…
Therefore a more secure and robust security framework is needed to be implemented.
We have followed an experimental approach to implement a security model for the IMS.
In this paper, the IMS security is discussed in detail. This paper provides a comprehensive survey of security threats to IMS network. A proposed IMS security model is discussed in detail to protect the IMS services and resources from these threats.
The rest of the paper is organized as follows. Section II presents an overview of the IP Multimedia Subsystem with special consideration given to security while section III describes related work about IMS security. Section IV and V describes the existing and proposed security solutions. The conclusion is given in section IV The last section ends with the future work.
II. AN OVERVIEW OF THE IP MULTIMEDIA SUBSYSTEM ARCHITECTURE
IMS architecture supports a wide range of services that are enabled based on SIP protocols. IMS network architecture has three layers (Device Layer, Transport Layer, and Control Layer) plus the service layer as shown in the figure below. An overview of these layers as shown in figure is given below.

Device layer: This layer of the IMS architecture provides the user the facility to select from end point devices such as computers, mobile phones, PDAs, and digital phones etc. These devices are able to connect to the IMS infrastructure via the Network. Other devices like traditional analog
Get Access