SIP and IMS Enabled Residential Gateway Sergio Romero Telefónica I+D Jan Önnegren Ericsson AB Alex De Smedt Thomson Telecom.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

The leader in session border control for trusted, first class interactive communications.
SIPPING 3GPP Requirements Ad Hoc Meeting Georg Mayer IETF#53, Minneapolis.
SIP, Presence and Instant Messaging
SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Fall VoN 2000 SIP Servers SIP Servers: A Buyers Guide Jonathan Rosenberg Chief Scientist.
Push-to-Talk over Cellular
1 IP Telephony (VoIP) CSI4118 Fall Introduction (1) A recent application of Internet technology – Voice over IP (VoIP): Transmission of voice.
July 20, 2000H.323/SIP1 Interworking Between SIP/SDP and H.323 Agenda Compare SIP/H.323 Problems in interworking Possible solutions Conclusion Q/A Kundan.
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
1 PERFORMANCE COMPARISON OF VERTICAL HANDOVER STRATEGIES FOR PSDR HETEROGENEOUS NETWORK 學生 : 鄭宗建 學號 :
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
IP Multimedia Subsystem (IMS) 江培文. Agenda Background IMS Definition IMS Architecture IMS Entities IMS-CS Interworking.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
World Class Standards ANFOV - Milano, 14 November 2007 – Paolo DE LUTIIS ANFOV - Milano, 14 November 2007 Autore:Paolo DE LUTIIS Telecom Italia Security.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
SIP and the application of SIP as used in 3GPP Keith Drage - Lucent Technologies.
Fixed Mobile Convergence T Research Seminar on Telecommunications Business Johanna Heinonen.
SIPPING IETF51 3GPP Security and Authentication Peter Howard 3GPP SA3 (Security) delegate
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
Introduction to SIP Speaker: Min-Hua Yang Advisor: Ho-Ting Wu Date:2005/3/29.
Deployment of the VoIP Servers BY: Syed khaja Najmuddin Ahmed Anil Kumar Marikukala.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
SIP/RTSP convergence draft-whitehead-mmusic-sip-for-streaming-media-05
NAT Traversal Speaker: Chin-Chang Chang Date:
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 © NOKIA 1999 FILENAMs.PPT/ DATE / NN SIP Service Architecture Markus Isomäki Nokia Research Center.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Presented By Team Netgeeks SIP Session Initiation Protocol.
1 Multimedia Services Service provider Service client Service registry Publish Find/discovery Bind Multimedia Services Framework and architecture.
Evolution towards the Next Generation Network
INTRODUCTION. 1.1 Why the Internet Protocol Multimedia Subsystem 1.2 Where did it come from?
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
IETF67 DIME WG Towards the specification of a Diameter Resource Control Application Dong Sun IETF 67, San Diego, Nov 2006 draft-sun-dime-diameter-resource-control-requirements-00.txt.
SIP working group IETF#70 Essential corrections Keith Drage.
SIP & H.323 Interworking Name: Amir Zmora Title: PM Date: Feb
1 Access Authentication to IMS Systems in Next Generation Networks Authors: Silke Holtmanns, Son Phan-Anh ICN’07 IEEE Speaker: Wen-Jen Lin.
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
Interactive Connectivity Establishment : ICE
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
SIP-H.323 Interworking Group RRR-1 IETF-48 SIP-H.323 Interworking Requirements draft-agrawal-sip-h323-interworking-reqs-00.txt Hemant.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
The Session Initiation Protocol - SIP
Analysis of SIP security Ashwini Sanap ( ) Deepti Agashe ( )
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
Firewalls, Network Address Translators(NATs), and H.323
IP Telephony (VoIP).
SIP over MANETs Introduction to SIP SIP vs MANETs Open Issues
Understand Networking Services
Session Initiation Protocol (SIP)
Application Layer Mobility Management Scheme for Wireless Internet
SIP Basics Workshop Dennis Baron July 20, 2005.
Ingate & Dialogic Technical Presentation
Presentation transcript:

SIP and IMS Enabled Residential Gateway Sergio Romero Telefónica I+D Jan Önnegren Ericsson AB Alex De Smedt Thomson Telecom

2 Index  Introduction  Existing issues  SIP & the CPN  3GPP vs IETF SIP  Proposed architecture  SIP B2BUA  Auxiliary file and DBs  Complete architecture  Functional examples  Conclusions

3 Introduction  IP multimedia services are becoming more and more demanded by residential users. Within this scenario:  SIP protocol has been designed for controlling IP multimedia sessions and is talented to replace previous signalling protocols like H.323 or the aged SS7  IMS has been presented as the framework able to provide a better service provisioning and control for IP multimedia services in a NGN architecture  the CPN needs to be “SIP&IMS-friendly”

4 Existing issues – SIP & the CPN  Legacy terminals do not support SIP  Legacy terminals (e.g. POTS or DECT phones) need a terminal adapter to translate dated signalling protocols and to act as SIP UA  Private IP addressing at the CPN  NA(P)T binding mechanisms at the RGW do not take into account that SIP messages take transport address information in their payload. To provide an effective NA(P)T traversal solution other techniques must be applied (e.g. STUN, ICE, or ALG)  Traffic blocking at the RGW  Firewall at the RGW needs to be configured to open signalling and media ports (e.g. 5060/UDP for SIP signalling and 8000/UDP for RTP media)

5 Existing issues – 3GPP vs IETF SIP  SIP profile  3GPP specifies a greater number of compulsory messages  3GPP requires a greater number of compulsory headers and has its own private headers (P-Headers)

6 Existing issues – 3GPP vs IETF SIP  Identities and security mechanisms  3GPP terminals require an ISIM application that stores public identities (IMPUs), but also the private identity (IMPI) and the authentication key that are used during the complex Digest AKA mechanism. IETF RFCs only provides an HTTP Digest based authentication mechanism  3GPP uses IPsec ESP to provide integrity and confidentiality between the terminal and the IMS core. IETF RFCs do not cover the establishment of any kind of SAs

7 Proposed architecture – SIP B2BUA  Definition  A B2BUA is a signalling control and handling entity that after receiving a SIP request/response can reformulate and send it out as a new request/response according to some given rules  A SIP B2BUA is able to manage and monitor the entire session state and parameters

8 Proposed architecture – SIP B2BUA  NA(P)T and firewall support  For signalling flows, a B2BUA can change when necessary the IP addresses and ports in the incoming or outgoing SIP messages  For media streams, a B2BUA can interact with the NA(P)T mechanism to provide the required bindings  In both cases, a B2BUA can ask the firewall to open the required ports  QoS assurance  The B2BUA can obtain from the SDP payload what codecs are going to be used in a multimedia session and interact with the CAC to check if there are enough resources to support the session

9 Proposed architecture – SIP B2BUA  SIP interworking  The B2BUA can generate, drop or modify different SIP messages in order to provide the required interoperability between a 3GPP network and those SIP UAs located at the CPN that only can understand the simpler IETF SIP profile  The B2BUA is able to use the information stored in an ISIM to be authenticated against the IMS network and it also can establish the required SAs  Multimedia PBX  The B2BUA can forward any SIP message at any time according to some rules. Hence, it is able to route all the incoming and outgoing SIP calls as a traditional PBX

10 Proposed architecture – Routing File  Routing File  Rules to control the multimedia sessions that are managed by the RGW. According to them, the B2BUA decides how outgoing or incoming sessions must be routed

11 Proposed architecture – Auxiliary Databases  Credentials DB  Local credentials that must be used at the registration to authenticate home users against the B2BUA  Location DB  Location information (bindings of contact addresses and SIP URIs) used by the B2BUA to route the messages

12 Proposed architecture – Auxiliary Databases  Service DB A.General B2BUA parameters like status, supported SIP methods, etc. B.SIP and IMS services parameters like servers addresses, listening ports, global credentials, etc. This DB can be remotely managed via TR-069 by extending TR-098 data model InternetGatewayDevice.B2BUA. SIPService.{i}. Service parameters required for accessing a concrete SIP service GlobalAoRUser's identity for the corresponding SIP network. This address will be included in the location database of the service provider. AuthenticationMethodHTTP Digest authentication or none authentication required for accessing the service provider network. Values: “None”, “Digest” Default: “Digest” DigestUsernameUsername for digest authentication. DigestPasswordPassword for digest authentication. RegistrationPeriodPeriod over which the registration must be refreshed, in seconds. RegisterExpiresRegister request Expires header value, in seconds. ProxyServerHost name or IP address of the SIP proxy server. ProxyServerPortDestination port when connecting to the SIP proxy server. Values: [0,65535] Default: 5060

13 Proposed architecture – Signalling handling  SIP/IMS Handling and Control  Routing & Control module modifies the SIP signalling (according to the routing rules), and can interact with the CAC, the NA(P)T and the Firewall  SIP/IMS Interworking module adapts different SIP profiles and uses the IMS identities (IMPI and IMPUs) and the key stored in the ISIM

14 Proposed architecture – General scenario

15 Functional examples – IMS registration

16 Functional examples – IMS session

17 Conclusions  The proposed architecture pushes the incorporation of the CPN to the IMS/NGN...  It contributes to ensure the viability of the multimedia sessions interacting automatically with other blocks of the RGW  It provides a total control of the ongoing multimedia sessions to the RGW administrator  It is able to adapt the signalling and the security mechanisms to fulfil 3GPP requirements