You are here

Implementing security in an IP Multimedia Subsystem (IMS) next generation network - a case study

Download pdf | Full Screen View

Date Issued:
2009
Summary:
The IP Multimedia Subsystem (IMS) has gone from just a step in the evolution of the GSM cellular architecture control core, to being the de-facto framework for Next Generation Network (NGN) implementations and deployments by operators world-wide, not only cellular mobile communications operators, but also fixed line, cable television, and alternative operators. With this transition from standards documents to the real world, engineers in these new multimedia communications companies need to face the task of making these new networks secure against threats and real attacks that were not a part of the previous generation of networks. We present the IMS and other competing frameworks, we analyze the security issues, we present the topic of Security Patterns, we introduce several new patterns, including the basis for a Generic Network pattern, and we apply these concepts to designing a security architecture for a fictitious 3G operator using IMS for the control core.
Title: Implementing security in an IP Multimedia Subsystem (IMS) next generation network - a case study.
443 views
69 downloads
Name(s): Ortiz-Villajos, Jose M.
College of Engineering and Computer Science
Department of Computer and Electrical Engineering and Computer Science
Type of Resource: text
Genre: Electronic Thesis Or Dissertation
Issuance: monographic
Date Issued: 2009
Publisher: Florida Atlantic University
Physical Form: electronic
Extent: x, 180 p. : ill. (some col.).
Language(s): English
Summary: The IP Multimedia Subsystem (IMS) has gone from just a step in the evolution of the GSM cellular architecture control core, to being the de-facto framework for Next Generation Network (NGN) implementations and deployments by operators world-wide, not only cellular mobile communications operators, but also fixed line, cable television, and alternative operators. With this transition from standards documents to the real world, engineers in these new multimedia communications companies need to face the task of making these new networks secure against threats and real attacks that were not a part of the previous generation of networks. We present the IMS and other competing frameworks, we analyze the security issues, we present the topic of Security Patterns, we introduce several new patterns, including the basis for a Generic Network pattern, and we apply these concepts to designing a security architecture for a fictitious 3G operator using IMS for the control core.
Identifier: 318643296 (oclc), 186763 (digitool), FADT186763 (IID), fau:2910 (fedora)
Note(s): by Jose M. Ortiz-Villajos.
Thesis (M.S.C.S.)--Florida Atlantic University, 2009.
Includes bibliography.
Electronic reproduction. Boca Raton, Fla., 2009. Mode of access: World Wide Web.
Subject(s): Electronic digital computers -- Programming
Computer networks -- Security measures
TCP/IP (Computer network protocol) -- Security measures
Internet Protocol Multimedia Subsystem (IMS) -- Security measures
Multimedia communications -- Security measures
Held by: FBoU FAUER
Persistent Link to This Record: http://purl.flvc.org/FAU/186763
Use and Reproduction: http://rightsstatements.org/vocab/InC/1.0/
Host Institution: FAU