FMC (Fixed Mobile Convergence)
|
|
|
- Kellie Hardy
- 10 years ago
- Views:
Transcription
1 FMC (Fixed Mobile Convergence) What About Security? Vancouver June 2008 Franck Veysset, Orange Labs Firstname.lastname at orange-ftgroup dot com
2 Agenda Introduction - FMC? WIFI-SIP overview UMA overview Femtocell overview iwlan Architecture Security? "Technology overview ( not FTGroup network strategy )" FIRST 2008 p 2
3 WiFi-SIP, UMA, FMC New needs new offers Simplify the current situation (PSTN, GSM, VoIP phones at home!!) Use of a single phone (wireless) At home and on the road Enhance quality / coverage at home WiFi: Use your own A.P. at home improve cellular l coverage Handover GSM/WIFI? Higher data rate -> new services? Lowers communication costs (at least from the customer point of view) Good for ARPU and market shares One phone = increase reachability Different technologies are available WiFi-SIP UMA (GAN) Femtocell / picocell Others FIRST 2008 p 3
4 FMC? Fixed to Mobile Convergence First tests: Denmark, 1997 PSTN/GSM Single number, one messaging system No handover First real offers in 2005 UMA based BT with Fusion, Bluetooth based at its beginning In France, emergence of FMC? After Triple play offers, quadruple play is becoming the standard Twin / beautifulphone (Dual phone GSM/WiFi SIP?) by n9uf Cegetel Free phone (GSM/WiFi SIP) Unik (GSM/UMA, Orange) FIRST 2008 p 4
5 FMC (2/2) Real FMC possible with WiFi wide adoption Low-power WiFi chips Phone (and WiFi) needs to be always on FIRST 2008 p 5
6 Other technologies exist More or less in use Don t provide handover Bluetooth VoIP Bluetooth dongle (Siemens) Dedicated WiFi phone Netgear Skype WiFi Phone Netgear SPH101 Other parternships between pure internet players and manufacturers SIM reader on fixed phone (to import contact list!) FIRST 2008 p 6
7 Wi-Fi SIP (Session Initiation protocol) FIRST 2008 p 7
8 SIP: Intro Internet World SIP is an IETF standard (2002) SIP provides signaling Voice transport relies on RTP WiFi-SIP very similar to genuine VoIP-SIP On the terminal SIP and RTP stack: signaling and stream Add IP and WIFI stack This is a WiFi SIP-phone SIP: just add another application on your Wi-Fi terminal Disjoined i from GSM access No handover (except with GSM private extensions ) FIRST 2008 p 8
9 Wi-Fi SIP Overview Home gateway SIP serveur Gateway / MGC SIP+RTP SIP+RTP SS7+voice FIRST 2008 p 9
10 SIP Security Authentication At best id and password (http digest) Strong authentication is possible but not mandatory (read: not used ) Need to be supported by terminals and servers Confidentiality Usually: Clear text (RTP ) It is possible to use SRTP (and SIP TLS) but Therefore relies on Wi-Fi security (critical path) Strong lack of security functionalities Does low cost means lack of functionalities? Sip design & security (IETF way ) Wi-Fi security is then critical WEP only? FIRST 2008 p 10
11 UMA (Unlicensed Mobile Access) FIRST 2008 p 11
12 UMA: Intro From the telco world UMA Consortium (Alcatel, BT, Cingular, Ericsson, Motorola, Nokia, Nortel, RIM, Siemens, Sony Ericsson, etc.) UMA not a standard, but specifications pushed into 3GPP (GAN) Provides an alternative access to 2G/3G services On the terminal IPsec stack: to reach the UMA platform UMA stack: GSM packet encapsulation in IP (includes RTP ) And of course IP+WiFi stack SIM (USIM) for crypto (authentication, encryption ) UMA: alternative ti access to GSM network Full access (Voice, GPRS, SMS ) FIRST 2008 p 12
13 FIRST 2008 p 13
14 UMA Overview FIRST 2008 p 14
15 UMA Functional Architecture FIRST 2008 p 15
16 UMA Security Authentication Authentication relies on the SIM/USIM IKEv2 and EAP-SIM / EAP-AKA (mutual) + X509 (server side) Then genuine GSM authentication (A3/A8) Encryption Wi-Fi security for domestic link IPsec between terminal and UNC Warning: NULL encryption possible on IPsec link FIRST 2008 p 16
17 Femtocell FIRST 2008 p 17
18 Principles Femtocells are low-power wireless access points that operate in licensed spectrum to connect standard mobile devices to a mobile operator s network using residential DSL or cable broadband connections (cf femtoforum.org) New way to connect to 2G/3G network Increase telco. coverage IP connection to core network Any 2G/3G handset supported FIRST 2008 p 18
19 Femtocell Architecture (3G) FIRST 2008 p 19
20 Femtocell Security No standardization yet (Work in progress) Femtoforum, 3GPP Authentication User and/or network authentication rely on the SIM/USIM Genuine GSM/UMTS world What about the *cell authentication? Usim? Encryption Idem, genuine GSM/UMTS functionalities Questions: Iub+ / A/Gb interfaces? BSC/RNC connected to the internet? IPsec on Iub+ link? Security of customer s RNC (thee *cell) is the key point FIRST 2008 p 20
21 iwlan FIRST 2008 p 21
22 I-WLAN Architecture FIRST 2008 p 22
23 I-WLAN Security Packet Data Gateway 3GPP AAA server HLR/AuC SA IKEv2 negotiation EAP cellular methods (EAP-AKA) Authentication vectors IPsec tunnel establishment Security similar il to UMA PDG located in a different place than in 3GPP architecture (PDG in the core network) FIRST 2008 p 23
24 I-Wlan Issues For now, data only services IPsec gateway on internet Attacks always possible Specific attacks on IKE v2, EAP-xxx fuzzing for example When the user is connected, access only to Wi interface Almost identical to genuine GPRS access Core network should not be reachable But the technology still looks quite immature FIRST 2008 p 24
25 Problems, security issues? FIRST 2008 p 25
26 Quick Analysis Not exhaustive New technology stay tuned for more information Implementation proprietary GAN conformity still to be confirmed SIP: relies on provider implementation / architectural choices Cell: also relies on provider implementation and tech choices I-WLAN: lack of standardization FIRST 2008 p 26
27 WiFi AP First thing: needs for a Wi-Fi access point Open, WEP, WPA? WiFi always on? This might have strong impact on your security Corporate case: deploy or reuse existing Wi-Fi network Mix voice and data on the same network? With uncontrolled internet access? FIRST 2008 p 27
28 Authentication (SIP, EAP ) SIP authentication May rely on clear text or HTTP digest MD5 is not particularly on the rise Brute force attack is feasible on low entropy passwords 40 Millions MD5 per second on a Bi-Xeon (mdcrack) More than 100M on well choosen hard (PS3 ) EAP-AKA AKA or EAP-SIM authentication ti ti Looks quite healthy Tamper resistant hardware is definitively a plus FIRST 2008 p 28
29 General comments Exposing Telco core network? Fuzzer anyone? This might be the next big threat Sensible devices are located at customer premises? Handling and locating emergency calls? Towards new frauds? Impact on customer network QoS on shared network Power outage FIRST 2008 p 29
30 Questions? Thanks for your attention
IJRDTM Kailash ISBN No. 978-1-62951-728-5 Vol.20 Issue 07 2013
WIRELESS & MOBILE NETWORK MANAGEMENT AND SERVICE INFRASTRUCTURE By VAIBHAV BANSAL Associate Professor / Tecnia Institute of Advanced Studies ABSTRACT The idea of using unlicensed radio in mobile handsets
How To Make A Multi-Line Phone A Multi Line Phone A Money Maker
Fixed Mobile Convergence Brough Turner Senior Vice President, Chief Technology Officer http://blogs.nmscommunications.com/communications NMS at a Glance Founded in 1983, publicly traded since 1994 Technology
Mobile@Home GSM services over wireless LAN
Mobile@Home GSM services over wireless LAN Martin Bäckström, Andreas Havdrup, Tomas Nylander, Jari Vikberg and Peter Öhman What do you get when you combine mobile telephony with voice over IP (VoIP)? Mobile@Home.
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless
Security and Authentication Concepts
Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy
How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)
Post-IP technologies virtualization and security Guy Pujolle 1 Virtualization for a post-ip network 2 Geni Intel would like to propose a generic router Intel proposes to have a generic hardware with virtual
Fixed versus Mobile Turning Convergence into Reality. Dieter Schuler, Wouter Franx Lucent Technologies
Fixed versus Mobile Turning Convergence into Reality Dieter Schuler, Wouter Franx Lucent Technologies Agenda Fixed Mobile Convergence Service Definition Operator Challenges IP Multimedia Subsystem the
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
Presentation for. Stream: IP Futures. VoIP The Next Wave. Alastair Slattery Business Development Manager Symbio Networks. Tuesday April 15, 2008
Presentation for Stream: IP Futures VoIP The Next Wave Alastair Slattery Business Development Manager Symbio Networks Tuesday April 15, 2008 http://www.symbionetworks.com Introduction Who we are: Symbio
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks [email protected] Hannu Verkasalo Helsinki University of Technology [email protected]
Overview of VoIP Systems
2 Overview of VoIP Systems In their simplest form, Voice over IP protocols simply enable two (or more) devices to transmit and receive real-time audio traffic that allows their respective users to communicate.
Briefing Note. Unlicensed Mobile Access (UMA)
Briefing Note Unlicensed Mobile Access (UMA) Document No: 06/43 Date: 30, August 2006 An Coimisiún um Rialáil Cumarsáide Commission for Communications Regulation Abbey Court Irish Life Centre Lower Abbey
Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA
Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA Snehlata Barde Sujata Khobragade Rasmiprava Singh NIT Raipur(C.G.) MATS university, Raipur MATS university,raipur
White Paper ON Dual Mode Phone (GSM & Wi-Fi)
White Paper ON Dual Mode Phone (GSM & Wi-Fi) Author: N Group 1.0 Abstract Dual Mode Handset is in demand for converged Network, Access, Billing, and Operation environment. Dual mode handsets provide cost
UMA/GAN the next wireless revolution?
UMA/GAN the next wireless revolution? Sandy Fraser Mobile Broadband Division This paper includes the opinions of the author and should not be taken as fact All trademarks are the properties of their respective
Securing Next Generation Mobile Networks
White Paper October 2010 Securing Next Generation Mobile Networks Overview As IP based telecom networks are deployed, new security threats facing operators are inevitable. This paper reviews the new mobile
How to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
Ravindranath Barathy 1, Dandavate Pushpak 2 and Das Bhumesh 3 ABSTRACT INTRODUCTION
Evolving Ideas Computing, Communication and Networking Publish by Global Vision Publishing House Edited 517 by Jeetendra Pande Nihar Ranjan Pande Deep Chandra Joshi Unlicensed Mobile Access (UMA) Ravindranath
3G/Wi-Fi Seamless Offload
Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...
Avaya, Trapeze and Nokia Mobility Solution Abstract
Avaya, Trapeze and Nokia Mobility Solution Abstract This application note describes the Avaya, Trapeze and Nokia mobility solution. This document is not a user guide or sales brochure. It is a how-to/tips
HALYS VOIP to GSM SOLUTION
1 HALYS VOIP to GSM SOLUTION Stay connected to office and home. 2 Halys VoiP to GSM Since two years, smartphones and tablets support the EAP-SIM authentication for the WiFi access, which involves the SIM
Fixed Mobile Convergence Options for the Enterprise
March 08 Fixed Mobile Convergence Options for the Enterprise Michael F. Finneran d B r n A s s o c i a t e s, I n c. 8 9 C u r t i s R o a d, W o o d m e r e, N Y 5 9 8 5 6. 5 6 9. 4 5 5 7 FMC Options
Mobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris
The OpenEapSmartcard platform Pr Pascal Urien ENST Paris /20 Pascal URIEN, CARTES 2005, November 16 th 2005 Introduction 1/4: Network ages Analog networks (Tree age) 1876, Alexander Graham Bell invents
Nokia Networks. Voice over Wi-Fi. White paper. Nokia Networks white paper Voice over Wi-Fi
Nokia Networks Voice over Wi-Fi White paper Nokia Networks white paper Voice over Wi-Fi Contents 1 Why consider VoWiFi? 3 2 User experience requirements 4 3 Mobile operator vs. OTT services 5 4 VoWiFi
Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated
3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543
Oracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure
Oracle s Secure HetNet Backhaul Solution A Solution Based on Oracle s Network Session Delivery and Control Infrastructure HetNets are a gradual evolution of cellular topology, not a distinct network unto
Cisco Wireless Security Gateway R2
Cisco Wireless Security Gateway R2 Product Overview The Cisco Wireless Security Gateway (WSG) is a highly scalable solution for tunneling femtocell, Unlicensed Mobile Access (UMA)/Generic Access Network
Wi-Fi calling for business: ROGERS WHITE PAPER. An Executive Overview
1 ROGERS WHITE PAPER Wi-fi calling for business An Executive Overview page 2 2 TABLE OF CONTENTS Introduction 3 What Is Wi-Fi Calling? 4 How Does It Work? 5 What Are the Business Benefits? 7 What Are the
Fixed Mobile Convergence (FMC): Understanding its Evolution, Advantages, and Challenges Role of Test, Monitoring, and Service Assurance
White Paper Fixed Mobile Convergence (FMC): Understanding its Evolution, Advantages, and Challenges Role of Test, Monitoring, and Assurance 1.0 Executive Summary At the core of understanding the promise
Seamless Mobility over Broadband Wireless Networks
Seamless Mobility over Broadband Wireless Networks F. Steuer, M. Elkotob, S. Albayrak, H. Bryhni, T. Lunde Abstract A broadband wireless architecture with 802.11 (/WiFi) as a core coverage technology supported
Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction...
Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction... 7 Fixed-WiMAX based on the IEEE 802.16-2004... 8 Mobile
Kommunikationsdienste im Internet Möglichkeiten und Risiken
Die Zukunft der Kommunikationsdienste im Internet Möglichkeiten und Risiken Erwin P. Rathgeb Technik der Rechnernetze, Universität Duisburg-Essen Jochen Kögel, Marc Barisch IKR, Universität Stuttgart Steffen
SpiderCloud E-RAN Security Overview
SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5
Wi-Fi integration with cellular networks enhances the customer experience. White paper
Wi-Fi integration with cellular networks enhances the customer experience White paper Executive summary Contents Executive Summary 2 Mobile data services fuel 3 the traffic tornado Wi-Fi integration offers
Secured Communications using Linphone & Flexisip
Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts
UMA paves the way for convergence
White Paper September 2005 UMA paves the way for convergence Intense competition increases operators incentives to launch UMA A recent survey indicates that more than 50 percent of the mobile subscribers
VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011
VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011 *Thanks to Prof. Angelos Keromytis for materials for these lecture slides. CSE545 - Advanced Network Security -
Delivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
Just as the ecommerce companies have
Protecting IMS Networks From Attack Krishna Kurapati Krishna Kurapati is the founder and CTO of Sipera Systems (www.sipera.com), a company that specializes in security for VOIP, mobile and multimedia communications.
2. Archtiecture overview related to support for use of a reverse http proxy
3GPP TSG SA WG3#30 S3-030576 6-10 Okt 2003 Povoa de Varzim, Porugal Agenda Item: Source: Title: Document for: GBA Alcatel Comparison of different solutions for GBA and AP based AS: standard TLS versus
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Smart VoIP Enabling Mobile Operators to Deliver OTT VoIP
Enabling Mobile Operators to Deliver OTT Kineto Wireless, Inc. 1601 McCarthy Blvd. Milpitas, CA 95035 Tel: +1 408 546 0660 2012 Kineto Wireless, Inc. All rights reserved. www.kineto.com Introduction Today
SIP Based Architecture for Integration of 1xRTT Femtocells
SIP Based Architecture for Integration of 1xRTT Femtocells 2007 Tatara Systems Tatara Systems grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable
WLAN/Cellular Convergence. Michael F. Finneran President dbrn Associates, Inc.
WLAN/Cellular Convergence Michael F. Finneran President dbrn Associates, Inc. 1 What Will Be Covered Market Overview WLAN Infrastructure Issues Potential Configurations - Non-Integrated Solutions - PBX
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Nokia Siemens Networks mobile softswitching Taking voice to the next level
Nokia Siemens Networks mobile softswitching Taking voice to the next level Providing an answer for today and tomorrow Evolving technologies Nokia Siemens Networks provides a solid platform for the future
Push-to-talk Over Wireless
Push-to-talk Over Wireless Is the time right for Push-to-talk? Does it work over GPRS? www.northstream.se Conclusions Push-to-talk is a walkie-talkie-type service implemented over mobile networks. US operator
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
LTE Overview October 6, 2011
LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term
VoIP in the Wireless World
VoIP in the Wireless World Aarti Iyengar Product Specialist, Nortel [email protected] July 2005, Sanog 6-1 Agenda Issues Standards and Market Evolution IP Multimedia Services Architecture Applications and
Converging Networks Laboratory
Converging Networks Laboratory Foresight to future technologies in a world class R&D facility +358 40 547 9441 Divergence Services Voice video email data web TV information entertainment purchasing Communities,
ISG50 Application Note Version 1.0 June, 2011
ISG50 Application Note Version 1.0 June, 2011 Scenario 1 - ISG50 is placed behind an existing ZyWALL 1.1 Application Scenario For companies with existing network infrastructures and demanding VoIP requirements,
Trends in IP Telecommunication
Trends in IP Telecommunication Dr. Mohammed Khurrum [email protected] Chairman, Exordium Networks Inc. Nisar Ahmad [email protected] Touchstone Communications Inc. Abstract The
Enterprise Options for Fixed Mobile Convergence and Mobile UC Options for the
May 09 Enterprise Options for Fixed Mobile Convergence and Mobile UC Options for the Michael F. Finneran d B r n A s s o c i a t e s, I n c. 1 8 9 C u r t i s R o a d, W o o d m e r e, N Y 1 1 5 9 8 5
How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph
. Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/[email protected] TROOPERS 2011, 30 March 2011 3G/UMTS femtocells
3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany
3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany Title: Response to: Source: To: Cc: Liaison on HTTP Security investigation within IMS LS S3-020475 (S2-022609) on Liaison on Security
WHITE PAPER. WiMAX Security for Real-World Network Service Provider Deployments
WHITE PAPER WiMAX Security for Real-World Network Service Provider Deployments Executive Summary For network service providers in search of next-generation subscriber services and new revenue streams,
Extensible Authentication Protocol (EAP) Security Issues
Sotillo ECU 1 Extensible Authentication Protocol (EAP) Security Issues Samuel Sotillo, Dept. of Technology Systems, East Carolina University Abstract This document describes the Extensible Authentication
Fixed Mobile Convergence - A Pre-IMS Solution
Fixed Mobile Convergence Migration for Cable Operators Moving From Next Generation Network to IMS Environment The growing market demand for service convergence is the driving force behind the development
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols
Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.
Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: & Print ISSN: Voice Calls between Wireless
Impact of IP on Mobile Communications THIS IS CISCO ON THE MOVE
Impact of IP on Mobile Communications David Caspari Vice President Asia Pacific Service Provider Feb 24, 2005 THIS IS CISCO ON THE MOVE 1 The Vision of Mobility Delivering Operational and Service Benefits
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
IP Voice Reseller. Deliver the VoIP services your customers demand without costly infrastructure investment or increased management complexity.
BT One for Communications IP Voice Reseller Deliver the VoIP services your customers demand without costly infrastructure investment or increased management complexity. We manage the technology to enable
KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60
SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION Page 54 of 60 UNIFIED COMMUNICATION SYSTEM (VOIP) PROPOSAL FOR KISUMU JUDICIARY COURTS. 1.0 PARTICULARS
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice
Femtocells: A Poisonous Needle in the Operator s Hay Stack
Femtocells: A Poisonous Needle in the Operator s Hay Stack Ravishankar Borgaonkar, Nico Golde and Kevin Redon Security in Telecommunications Technische Universität Berlin and Deutsche Telekom Laboratories
Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity
Secure Remote Monitoring of the Critical System Infrastructure An Application Note from the Experts in Business-Critical Continuity TABLE OF CONTENTS Introduction................................................2
IMS Interconnect: Peering, Roaming and Security Part One
T E C H N O L O G Y W H I T E P A P E R IMS Interconnect: Peering, Roaming and Security Part One IMS interconnection promises to enable greater reach and richer offerings for the providers that establish
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
V660. Quick Start Guide. Dual-Mode Phone. Version 1.00 04/2007 Edition 1. Copyright 2007. All rights reserved
V660 Dual-Mode Phone Quick Start Guide Version 1.00 04/2007 Edition 1 Copyright 2007. All rights reserved 1 Overview Your V660 provides standard cellphone functions, and adds WiFi connectivity. In the
Feature and Technical
BlackBerry Mobile Voice System for SIP Gateways and the Avaya Aura Session Manager Version: 5.3 Feature and Technical Overview Published: 2013-06-19 SWD-20130619135120555 Contents 1 Overview...4 2 Features...5
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012
Mobile Voice Off-Load
Mobile Voice Off-Load An AdvOSS Solution White Paper Latest version of this white paper can always be found at: http://advoss.com/resources/whitepapers/mobile-voice-offload.pdf For more information, contact
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Security in the Evolved Packet System
Vinjett Keeping wireless communication secure 4 Security in the Evolved Packet System Security is a fundamental building block of wireless telecommunications systems. It is also a process new threats are
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
Cisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
Nokia Mobile VPN Client
User s Guide Nokia Mobile VPN Client 4.0 Admin s Guide Nokia Mobile VPN Client for Symbian devices October 2010 1 Nokia for Business Table of Contents 1 About This Document... 3 1.1 Scope... 3 1.2 References...
Expert Reference Series of White Papers. Using Voice over IP (VoIP) in Mobile Networks
Expert Reference Series of White Papers Using Voice over IP (VoIP) in Mobile Networks 1-800-COURSES www.globalknowledge.com Using Voice over IP (VoIP) in Mobile Networks Donald Hill, ProActive Technical
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
VoIP Security: How Secure is Your IP Phone?
VoIP Security: How Secure is Your IP Phone? Dan York, CISSP Director of IP Technology, Office of the CTO Chair, Mitel Product Security Team Member, Board of Directors, VoIP Security Alliance (VOIPSA) ICT
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Security issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction
The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network Girish Patel Wireless Solutions Nortel Networks Richardson, TX [email protected] Steven Dennett Personal Communications Sector Motorola
