Security Services in IMS (IP Multimedia Subsystem)
|
|
- Jonah Fowler
- 7 years ago
- Views:
Transcription
1 Security Services in IMS (IP Multimedia Subsystem) Priya Hariharan Siddiqui Abbas Ali Chair for Communication Technology (ComTec), Faculty of Electrical Engineering / Computer Science
2 Agenda Today s customer & operator needs Why IMS?? IMS Overview Why security?? Security services in IMS Control Plane security - Access security - Network domain security Media Plane security References 2
3 What Customer & Operator needs?? For Customer Rich user experience more broadband on move, communicate in real time using any combination of voice, video, picutre & messages Convenience and ease of use interoperability between terminals & operators Safe Communication Free from middleware or malicious attacks, authorised access For Operator Expand service offerings and revenues Controlled subscriber and business relationships Service Interoperability for mass market services 3
4 Why IMS??? Enables rich communications combining multiple media or services New IP-based services, easier & faster service creation and execution Access independency, easier interworking with the Internet Services available over different access technologies One network architecture for accommodating all services Providing and requiring optimized Quality of Service Smooth evolution from today s networks and standards Cost efficiency, evolution for current solutions Openness: both specifications and (distributed) architecture 4
5 IMS Overview IMS (IP Multimedia Subsystem) used by UMTS for providing IP telecommunications Supports voice telephony, live video streaming, instant messaging, etc. Performs signaling operations using the Session Initiation Protocol (SIP) Uses CSCF to provide multimedia services Continued 5
6 IMS Overview 6
7 Why Security??? Threats in the form of... Destruction Corruption Removal Disclosure Interruption Security Access control Authentication Data confidentiality Communication security Data integrity Availability Privacy 7
8 Security Services in IMS. - IMS Control Plane security access security protection against insertion, modification and replay of SIP messages Network domain security protection against eavesdroping of signalling information in SIP messages -IMS media plane security Protection against eavesdropping of user traffic 8
9 IMS Network domain security - Secure signalling between IMS network elements - Deployment options Gateway to gateway security Per hop security between network elements via IPsec gateways End-to-end security between network elements.continued 9
10 IMS Network domain security Network domain security for IP based protocols (NDS/IP) is based on IPsec NDS/IP uses Encapsulating Security payload (ESP) & it is required to operate in tunnel mode Security services provided by NDS/IP are Connectionless data integrity Replay protection Data origin authentication Data confidentiality for the whole original IP packet NDS/IP is specified at the network layer. Hence protection for new IP protocols is achieved almost cost-free 10
11 NDS/IP Architecture Traffic entering and leaving security domain passes through security gateway (SEG) Functionalities of SEG tunnels traffic toward a defined set of other security domains Hop by hop security between security domains Enforce security policy when passing traffic between security domains 11
12 Components Overview Call Session Control Functions in IMS P-CSCF (Proxy) Directs SIP messages from MS to home network. I-CSCF (Interrogating) Firewall for SIP messages directed toward home network. Selects S- CSCF for the IMS. S-CSCF (Serving) Located in home network to provide session control of multimedia services. HSS(Home Subscriber Server) ISIM(IP Multimedia Services Identity Module) UICC(Universal Integerated Circuit Card) SIP(Session Intiation Protocol) 12
13 IMS Access Security 13
14 How IP Multimedia registration?? 14 PDP: P-CSCF (Proxy): Directs SIP messages from MS to home network. S-CSCF (Serving) :Located in home network to provide session control of multimedia services. I-CSCF (Interrogating) :Firewall for SIP messages directed toward home network. Selects S-CSCF for the MS. HSS Home Subscriber Server
15 Subscriber in Home Network 15
16 Mobility in IMS/SIP environment -The roaming user contacts the P-CSCF in the Visited network -The authentication is done by the I-CSCF of the home network -Ensure the services are made by home network SIP servers 16
17 IMS Access Security for HTTP-based Services Why security for HTTP?? Because use of HTTP within IMS for various Service-Related purposes Many solutions and suggestions has been proposed to solve security problem in IMS Proposal given by Nokia to provide security to the HTTP will be discused here. 17
18 IMS HTTP acess security 18 P-CSCF (Proxy): Directs SIP messages from MS to home network. S-CSCF (Serving) :Located in home network to provide session control of multimedia services. I-CSCF (Interrogating) :Firewall for SIP messages directed toward home network. Selects S-CSCF for the MS.
19 IMS Media plane Security 19
20 References... %20Mike%20Walker%20presentation.pdf nal.ppt ators/mobileoperators&serviceproviders/mobilenetworks/intelligentedge/_content /_Static_Files/ip_multimedia_new_era_in_communications.pdf menttiarkisto/viestinta_ja_aktivointi/seminaarit/nets_1a/mikko_puuskari.pdf...& more 20
21 Suggestions... Thank you for your attention... 21
Security considerations for IMS access independence
3GPP TSG SA WG3 Security S3#20 S3-010468 16-19 October, 2001 Sydney, Australia Source: Title: Document for: Agenda Item: Telia / independence Information Security Security considerations for access independence
More informationMobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
More information3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany
3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany Title: Response to: Source: To: Cc: Liaison on HTTP Security investigation within IMS LS S3-020475 (S2-022609) on Liaison on Security
More informationEnd-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
More informationHow to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
More informationCOPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments
Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures
More informationInvestigation of Interworked IMS Architecture In Terms Of Traffic Security
Master Thesis in Electrical Engineering Department Of Telecommunication Engineering Blekinge Institute of Technology Investigation of Interworked IMS Architecture In Terms Of Traffic Security By: Aftab
More informationAcme Packet Net-Net SIP Multimedia-Xpress
Acme Packet Net-Net SIP Overview Net-Net SIP (SMX) combines IP Multimedia Subsystem (IMS) session management with leading session border control (SBC) functions to reduce the complexity and cost of delivering
More informationDelivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
More informationTable of Content. Introduction Components Architectural Characteristics Concepts Protocols Service Examples Discussion. ToC
Danar Barzanji Marcel K Steffen Roger Trösch 22.06.2006 Communication Systems IMS www.packetizer.com Table of Content Introduction Components Architectural Characteristics Concepts Protocols Service Examples
More informationImplementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 109 Implementing Conditional Conference Call Use Case over IMS and Non
More informationOpen IMS Core with VoIP Quality Adaptation
Open IMS Core with VoIP Quality Adaptation Is-Haka Mkwawa, Emmanuel Jammeh, Lingfen Sun, Asiya Khan and Emmanuel Ifeachor Centre for Signal Processing and Multimedia Communication School of Computing,Communication
More informationArchitectural Overview of IP Multimedia Subsystem -IMS
Architectural Overview of IP Multimedia Subsystem -IMS Presented by: Masood Khosroshahy June 2006 B E G I N N I N G 1 Project supervisor: Prof. Elie Najm Simplified view of the layered architecture in
More informationAdvanced SIP Series: SIP and 3GPP Operations
Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.
More informationETSI TS 182 023 V2.1.1 (2009-01) Technical Specification
TS 182 023 V2.1.1 (2009-01) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Core and enterprise NGN interaction scenarios; Architecture
More informationStudying IMS Signalling in LTE-based Femtocell Network
Int. J. on Recent Trends in Engineering and Technology, Vol. 11, No. 1, July 2014 Studying IMS Signalling in LTE-based Femtocell Network Sinan Ghassan Abid Ali 1, Mohd Dani Baba 2, Mohd Asri Mansur and
More informationA Proposed Model For QoS guarantee In IMSbased Video Conference services
International Journal of Intelligent Information Technology Application, 2009, 2(5):243-249 A Proposed Model For QoS guarantee In IMSbased Video Conference services Maryam Kiani Department of Electrical
More informationOverview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background
GSMA Overview of GSMA Profile It was agreed in the GSMA in February 2010 that voice services over LTE () shall use the platform standardized by the 3GPP with a view to maximizing international interoperability.
More informationInter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France mehdi.mani@int-evry.fr Noel Crespi Wireless
More informationAdvanced SIP Series: SIP and 3GPP
Advanced SIP Series: SIP and 3GPP, Award Solutions, Inc Abstract The Session Initiation Protocol has been selected as the main signaling protocol of the Third Generation Partnership Projects IP Multimedia
More informationA Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
More informationof the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier
VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture
More informationIMS Interconnect: Peering, Roaming and Security Part One
T E C H N O L O G Y W H I T E P A P E R IMS Interconnect: Peering, Roaming and Security Part One IMS interconnection promises to enable greater reach and richer offerings for the providers that establish
More informationMED: Voice over IP systems
www.ptt.co.uk Online course specification MED: Voice over IP systems Target audience: This online course is designed for those who will be responsible for the design or maintenance of Voice over IP (VoIP)
More informationEnd-to-End Quality-of-Service Support in Next Generation Networks with NSIS
End-to-End Quality-of-Service Support in Next Generation Networks with NSIS Roland Bless, Martin Röhricht Karlsruhe Institute of Technology, Germany Institute of Telematics, Department of Computer Science
More informationInternet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)
Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol
More informationPARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS
Draft Recommendation Q.3902 PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Summary This Recommendation describes the main
More informationWHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services
WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services Harry G. Perros Computer Science Department NC State University, Raleigh 27695 USA Email: hp@ncsu.edu
More informationVoice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com
1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested
More informationPush-to-talk Over Wireless
Push-to-talk Over Wireless Is the time right for Push-to-talk? Does it work over GPRS? www.northstream.se Conclusions Push-to-talk is a walkie-talkie-type service implemented over mobile networks. US operator
More information4G Mobile Networks At Risk
07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis
More informationJuha Heinänen jh@tutpro.com
From Voice over IP to Voice over Internet Juha Heinänen jh@tutpro.com From VoIP to VoINET VoIP replaced wires in PBX and PSTN backbones with IP preserves the traditional, centralized telephony service
More informationInternet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
More informationEfficient evolution to all-ip
Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players
More informationConferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem
GPP X.S00-0 Version.0 Version Date: May 00 Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem Revision: 0 COPYRIGHT GPP and its Organizational Partners claim copyright in this document
More information3GPP TR 23.981 V6.4.0 (2005-09)
TR 23.981 V6.4.0 (2005-09) Technical Report 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Interworking aspects and migration scenarios for based IMS Implementations
More informationLTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols
More informationPacket Switched Voice (over IP) and Video Telephony Services End-to-end System Design Technical Report
GPP X.R00-0 Version:.0 Date: November 00 Packet Switched Voice (over ) and Video Telephony Services End-to-end System Design Technical Report COPYRIGHT GPP and its Organizational Partners claim copyright
More informationSession Border Controllers: Addressing Tomorrow s Requirements
White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction
More informationAn Evaluation of Architectures for IMS Based Video Conferencing
An Evaluation of Architectures for IMS Based Video Conferencing Richard Spiers, Neco Ventura University of Cape Town Rondebosch South Africa Abstract The IP Multimedia Subsystem is an architectural framework
More informationETSI TS 133 210 V12.2.0 (2014-10)
TS 133 210 V12.2.0 (2014-10) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; 3G security; Network Domain Security
More informationPerformance Estimation of a SIP based Push-to-Talk Service for 3G Networks
Performance Estimation of a SIP based Push-to-Talk Service for 3G Networks Eoin O Regan and Dirk Pesch Adaptive Wireless Systems Group Cork Institute of Technology Ireland Abstract Push-To-Talk (PTT) is
More information... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function
Next Generation Network Service Architecture in the IP Multimedia Subsystem Anahita Gouya, Noël Crespi, Lina Oueslati, {anahita.gouya, noel.crespi, lina.oueslati}@int-evry.fr, Institut National des Télécommunications
More informationDraft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
More information21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
More informationOverview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated
3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543
More informationEnd Device Support for AAA in SIP Conferencing
End Device Support for AAA in SIP Conferencing Antti Poikela Helsinki University of Technology aspoikel@cc.hut.fi Abstract This study is a literature survey of current problems and solutions for authentication,
More informationS-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009
S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need
More informationARIB STD-T63-33.210 V5.5.0. 3G Security; Network Domain Security; IP network layer security (Release 5)
ARIB STD-T63-33.210 V5.5.0 3G Security; Network Domain Security; IP network layer security (Release 5) Refer to "Industrial Property Rights (IPR)" in the preface of ARIB STD-T63 for Related Industrial
More informationITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
More informationCurrent and Future Research into Network Security Prof. Madjid Merabti
Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition
More informationApplication Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
More informationLocation in SIP/IP Core (LOCSIP)
in SIP/IP Core (LOCSIP) Conveyance with IMS: the OMA LOCSIP Service Enabler Mike Loushine / Don Lukacs Telcordia Applied Research 2009, Telcordia Technologies Inc. in SIP/IP Core (LOCSIP) Topics General
More informationSecure Communication and VoIP Threats in Next Generation Networks
International Journal of Computer and Communication Engineering, Vol. 2, No. 5, September 2013 Secure Communication and VoIP Threats in Next Generation Networks M. Hossein Ahmadzadegan, M. Elmusrati, and
More informationEconomics of Internet Applications
Economics of Internet Applications Technology influences business models Technology decisions affect business models Business models influence technology decisions Example 1: the end2end principle TCP/IP,
More informationSS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 akg0x11@gmail.com Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
More informationTDM services over IP networks
Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which
More informationApplication Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
More informationA Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
More informationProtocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
More informationContents. Preface. Acknowledgement. About the Author. Part I UMTS Networks
Contents Preface Acknowledgement About the Author Acronyms xv xxi xxiii xxv Part I UMTS Networks 1 Introduction 3 1.1 Mobile Telecommunication Networks and Computer Networks 4 1.2 Network Design Principles
More informationARIB STD-T63-33.210 V6.6.0. 3G Security; Network Domain Security; IP network layer security (Release 6)
ARIB STD-T63-33.210 V6.6.0 3G Security; Network Domain Security; IP network layer security (Release 6) Refer to "Industrial Property Rights (IPR)" in the preface of ARIB STD-T63 for Related Industrial
More informationA Scenario of Machine-to-Machine (M2M) Health Care Service
A Scenario of Machine-to-Machine (M2M) Health Care Service Jung-Ho Kim*, Ya-Ting Wei*, Jae-Oh Lee* * Dept. of Electrical, Electronics &, Korea University of Technology and Education, Korea {jungho32, weiyating,
More informationCloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures
4th Workshop on Mobile Cloud Networking, June 19th, 2014, Lisbon, Portugal Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures Giuseppe Carella, Marius
More informationJust as the ecommerce companies have
Protecting IMS Networks From Attack Krishna Kurapati Krishna Kurapati is the founder and CTO of Sipera Systems (www.sipera.com), a company that specializes in security for VOIP, mobile and multimedia communications.
More informationVOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationSecurity issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
More informationAn outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
More informationAnalysis of Enterprise VoIP Traffic from a Wire line IMS System. Yu Bai Master Thesis Supervisor: Tord Westholm, EAB Supervisor: Dougherty Mark, DU
Analysis of Enterprise VoIP Traffic from a Wire line IMS System Yu Bai Master Thesis Supervisor: Tord Westholm, EAB Supervisor: Dougherty Mark, DU DEGREE PROJECT Computer Engineering Program Master of
More informationThis specification this document to get an official version of this User Network Interface Specification
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
More informationExamining Proxies to Mitigate Pervasive Surveillance
Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and
More informationThe Need for Session Delivery Networks
Executive Summary Service providers, enterprises and contact centers continue to build IP-based infrastructure to lower their operating costs and introduce new IP-enabled offerings such as VoIP, video-over-ip
More informationMigration of Enterprise VoIP/SIP Solutions towards IMS
1 Migration of Enterprise VoIP/SIP Solutions towards IMS Ram Kumar 1, Frank Reichert 1, Andreas Häber 1, Anders Aasgard 2, Lian Wu 2 Abstract Voice-over-IP (VoIP) solutions are now widely spread and accepted
More informationNokia Siemens Networks mobile softswitching Taking voice to the next level
Nokia Siemens Networks mobile softswitching Taking voice to the next level Providing an answer for today and tomorrow Evolving technologies Nokia Siemens Networks provides a solid platform for the future
More informationIP Multimedia System: general aspects and migration perspectives
IMS TPC EPC IP Multimedia System: general aspects and migration perspectives Dr. Leo Lehmann Federal Office of Communication, Switzerland ITU Workshop on Developments regarding telecommunication network
More informationIMS/SIP Video Service in HD world. RADVISION TBU Interactive Video IMS BEEHD
IMS/SIP Video Service in HD world Welcome to RADVISION THE INDUSTRY S EXPERT IN VISUAL COMMUNICATIONS RADVISION is the leading provider of core technologies, products and solutions that enable unified
More informationWanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture
Wanderlust: Enabling roaming in the LTE era Don Troshynski Vice President, Solutions Architecture Acme Packet Trusted, first-class services and applications Apps & services Session delivery network April
More informationVoice Quality with VoLTE
Matthias Schulist Akos Kezdy Qualcomm Technologies, Inc. Voice Quality with VoLTE 20. ITG Tagung Mobilkommunikation 2015 Qualcomm Engineering Services Support of Network Operators Strong R&D Base End-to-end
More informationNGN Functional Architecture for Resource Allocation and Admission Control
NGN Functional Architecture for Resource Allocation and Admission Control 1 Hassan Yeganeh, 2 Maryam Shakiba, and 3 Amir hassan Darvishan Iran Telecommunication Research Center 1 yeganeh@itrc.ac.ir, 2
More informationFixed versus Mobile Turning Convergence into Reality. Dieter Schuler, Wouter Franx Lucent Technologies
Fixed versus Mobile Turning Convergence into Reality Dieter Schuler, Wouter Franx Lucent Technologies Agenda Fixed Mobile Convergence Service Definition Operator Challenges IP Multimedia Subsystem the
More informationFirewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
More informationBEng (Hons) Telecommunications. Examinations for 2011 2012 / Semester 1
BEng (Hons) Telecommunications Cohort: BTEL/10A/FT Examinations for 2011 2012 / Semester 1 MODULE: IP Telephony MODULE CODE: TELC3107 Duration: 2 Hours Reading time: 15 Minutes Instructions to Candidates:
More informationVoIP in the Wireless World
VoIP in the Wireless World Aarti Iyengar Product Specialist, Nortel aarti@nortel.com July 2005, Sanog 6-1 Agenda Issues Standards and Market Evolution IP Multimedia Services Architecture Applications and
More informationPublic Safety Communication using Commercial Cellular Technology
Public Safety Communication using Commercial Cellular Technology Rolf Blom, Peter de Bruin, Jesper Eman, Mats Folke, Hans Hannu, Mats Näslund, Marika Stålnacke and Per Synnergren Ericsson Research, Sweden
More informationTSGS#27(05)0115. Technical Specification Group Services and System Aspects Meeting #27, 14-17 March 2005,Tokyo, Japan
Technical Specification Group Services and System Aspects Meeting #27, 14-17 March 2005,Tokyo, Japan TSGS#27(05)0115 Source: TSG SA WG2 Title: CR(s) to 23.981 Agenda item: 7.2.3 Document for: APPROVAL
More informationSIP in Mobile Environments - Applications and Possibilities
SIP in Mobile Environments - Applications and Possibilities Marko Berg Helsinki University of Technology Marko.Berg@iki.fi Abstract With the recent emergence of a myriad of mobility-enabling technologies,
More informationMitigating the Security Risks of Unified Communications
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Mitigating the Security Risks of Unified Communications Fernando Almeida 1 +, Jose
More informationgrow as a result of further service diversification.
All-IP Network Conversion of CS to IP-based Network Special Articles on All-IP Network Technology Evolution of Core Network IP-based FOMA Voice Network toward Enhanced Services and Improved Efficiencies
More informationNTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: chgan@csie.nctu.edu.tw Date: 2006/05/02 1 Outline Introduction NTP VoIP
More informationChapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
More informationVoice over IP Communications
SIP The Next Big Step Voice over IP Communications Presented By: Stephen J. Guthrie VP of Operations Blue Ocean Technologies Goals What are our Goals for Today? Executive Summary: It is expected that real-time
More informationETSI TS 124 147 V6.8.0 (2008-04) Technical Specification
TS 124 147 V6.8.0 (2008-04) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Conferencing using the IP Multimedia (IM) Core
More informationSecurity Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
More informationService Identifier Comparison module Service Rule Comparison module Favourite Application Server Reinvocation Management module
Service Broker for Managing Feature Interactions in IP Multimedia Subsystem Anahita Gouya, Noël Crespi {anahita.gouya, noel.crespi @int-evry.fr}, Institut National des télécommunications (GET-INT) Mobile
More informationIPv6 Security: How is the Client Secured?
IPv6 Security: How is the Client Secured? Jeffrey L Carrell Network Conversions Network Security Consultant 1 IPv6 Security: How is the Client Secured? IPv6/IPsec IPsec Challenges IPsec Monitoring/Management
More informationCS 4803 Computer and Network Security
Network layers CS 4803 Computer and Network Security Application Transport Network Lower level Alexandra (Sasha) Boldyreva IPsec 1 2 Roughly Application layer: the communicating processes themselves and
More informationSIP Roaming Server Product Overview. Mobile Convergence Technology
SIP Roaming Server Product Overview Mobile Convergence Technology CONNECTING NETW ORKS Roam, Talk and Text (without a Mobile Network) By interworking with existing communications infrastructures, Session
More informationIngate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
More informationInternational Telecommunication Union. IETF Security Work. Magnus Nyström. Technical Director, RSA Security Presentation made on behalf of the IETF
International Telecommunication Union IETF Security Work Magnus Nyström Technical Director, RSA Security Presentation made on behalf of the IETF Background Internet Engineering Task Force o International
More informationThe Regulatory framework and VoIP. Merijn Schik, DG INFOSOC
The Regulatory framework and VoIP Merijn Schik, DG INFOSOC Disclaimer This presentation is personal to its author and does not necessarily reflect the official position of the Commission No inferences
More information