A Secure Architecture for Nomadic User in IMS Network

A Secure Architecture for Nomadic User in IMS Network

A. Abou El Kalam, M. Maachaoui, N. Idboufker, H. Ait Lahcen, A.Ait Ouahman
Copyright: © 2012 |Volume: 4 |Issue: 1 |Pages: 17
ISSN: 1937-9412|EISSN: 1937-9404|EISBN13: 9781466613492|DOI: 10.4018/jmcmc.2012010101
Cite Article Cite Article

MLA

El Kalam, A. Abou, et al. "A Secure Architecture for Nomadic User in IMS Network." IJMCMC vol.4, no.1 2012: pp.1-17. http://doi.org/10.4018/jmcmc.2012010101

APA

El Kalam, A. A., Maachaoui, M., Idboufker, N., Lahcen, H. A., & Ouahman, A. (2012). A Secure Architecture for Nomadic User in IMS Network. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 4(1), 1-17. http://doi.org/10.4018/jmcmc.2012010101

Chicago

El Kalam, A. Abou, et al. "A Secure Architecture for Nomadic User in IMS Network," International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 4, no.1: 1-17. http://doi.org/10.4018/jmcmc.2012010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The IP multimedia subsystem (IMS) is a basis for a significant new architecture which offers network operators the opportunity to expand their services, by integrating voice and multimedia communications and delivering them into new environments with new purposes. Basically, the IMS is an overlay network on top of IP layer that uses Session Initiation Protocol (SIP) as the primary signaling mechanism. SIP works at the application layer in IP networks. It is thus faced to not only the IP-networks security issues, but also to new issues which are related to the SIP protocol directly. Consequently, using IMS bears several new security challenges. This paper presents the most relevant SIP-related security vulnerabilities and threats, and the implementation and simulation test bed to experiment two versions of the SIP Asterisk software to emphasize these threats. The different security mechanisms that can be deployed to overcome the SIP security issues while putting emphasis the most important ones are discussed. Afterwards, the authors propose adaptable solutions to the SIP threats already identified for a specific service (access information from anywhere) in IMS context. Finally, conclusions are drawn and some perspectives are introduced to improve the security of multimedia applications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.