6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.

Slides:



Advertisements
Similar presentations
SIPPING 3GPP Requirements Ad Hoc Meeting Georg Mayer IETF#53, Minneapolis.
Advertisements

Fall IM 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Secure Mobile IP Communication
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Company LOGO Interworked WiMAX-3G Cellular Data Networks: An Architecture for Mobility Management and Performance Evaluation 指導教授: 童曉儒 教授 學生:許益晨 IEEE TRANSACTIONS.
1 Requirements Catalog Scott A. Moseley Farbum Scotus.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Signalling Flows for the IP Multimedia Call Control in 3G Wireless Network Master’s Project By Sanjeev Kayath.
1 PERFORMANCE COMPARISON OF VERTICAL HANDOVER STRATEGIES FOR PSDR HETEROGENEOUS NETWORK 學生 : 鄭宗建 學號 :
All-IP distributed (proxy) control model architecture Henrik Basilier, Ericsson ALLIP __ERI_distributed_CM.
IP Multimedia Subsystem (IMS) 江培文. Agenda Background IMS Definition IMS Architecture IMS Entities IMS-CS Interworking.
World Class Standards ANFOV - Milano, 14 November 2007 – Paolo DE LUTIIS ANFOV - Milano, 14 November 2007 Autore:Paolo DE LUTIIS Telecom Italia Security.
IMS Workshop- Summary James Rafferty August
SIP and the application of SIP as used in 3GPP Keith Drage - Lucent Technologies.
Fixed Mobile Convergence T Research Seminar on Telecommunications Business Johanna Heinonen.
One-Pass GPRS and IMS Authentication Procedure for UMTS
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
SIPPING IETF51 3GPP Security and Authentication Peter Howard 3GPP SA3 (Security) delegate
All IP Network Architecture 2001 년 12 월 5 일 통신공학연구실 석사 4 차 유성균
 3G is the third generation of tele standards and technology for mobile networking, superseding 2.5G. It is based on the International Telecommunication.
SIP vs H323 Over Wireless networks Presented by Srikar Reddy Yeruva Instructor Chin Chin Chang.
Agenda Introduction to 3GPP Introduction to SIP IP Multimedia Subsystem Service Routing in IMS Implementation Conclusions.
Issues of HIP in an Operators Network Nick Papadoglou Thomas Dietz.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Support Services & IP Multimedia Subsystem (IMS)
Authors: Jiann-Liang Chenz, Szu-Lin Wuy,Yang-Fang Li, Pei-Jia Yang,Yanuarius Teofilus Larosa th International Wireless Communications and Mobile.
June 2006 Roles of Session Border Controllers in IMS Networks CANTO - June 2006.
“IMS in a Bottle”: Initial Experiences from an OpenSER-based Prototype Implementation of the 3GPP IP Multimedia Subsystem Author:Joachim Fabini, Peter.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
2 VoIP Mobility & Security Scott Poretsky Director of Quality Assurance Reef Point Systems Securing Fixed-Mobile and Wireless VoIP Convergence Services.
IP Multimedia Subsystems By Vamsee K Pemmaraju. Agenda IMS Example IMS Example Overview Overview Basic Principles Basic Principles Architecture Architecture.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Chapter 4 Application Level Security in Cellular Networks.
SIP Extensions for Enhanced Location Based Services in 3G Networks International SIP 2004, Paris Pavitra Krishnaswamy Application-Ready.
1 Multimedia Services Service provider Service client Service registry Publish Find/discovery Bind Multimedia Services Framework and architecture.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop - draft - Jack Nasielski
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
INTRODUCTION. 1.1 Why the Internet Protocol Multimedia Subsystem 1.2 Where did it come from?
Telecom in Transition Global Telecommunications is in a time of dramatic transition –Traditional telephone service was just about voice –We now live in.
IMS 架構與話務分析 網路管理維運資源中心 日期 : 2013/07/25 網路管理維運資源中心 日期 : 2013/07/25 限閱.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
1 © NOKIA Functionality and Testing of Policy Control in IP Multimedia Subsystem Skander Chaichee HUT/Nokia Networks Supervisor: Professor Raimo.
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
1 Access Authentication to IMS Systems in Next Generation Networks Authors: Silke Holtmanns, Son Phan-Anh ICN’07 IEEE Speaker: Wen-Jen Lin.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 9: Σύγκλιση Σταθερών και Κινητών Επικοινωνιών (Fixed-Mobile Convergence) Διδάσκων: Βασίλειος Σύρης Τμήμα:
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
3G wireless system  Speeds from 125kbps-2Mbps  Performance in computer networking (WCDMA, WLAN Bluetooth) & mobile devices area (cell.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
Authors: Jiann-Liang Chenz, Szu-Lin Wuy, Yang-Fang Li, Pei-Jia Yang,
November 2001 Lars Falk, TeliaSlide 1 doc.: IEEE /617r1 Submission Status of 3G Interworking Lars Falk, Telia.
Page 1TTT - May 12, GPP IMS Standardization Update Bell Labs Innovations Lucent Technologies Room 9C Lucent Ln. Naperville, IL E Mail.
S Postgraduate Course in Radio Communications. Interoperability between 3G and WLAN using IMS Antti Keurulainen,
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
1 Special Topics in Computer Engineering Supervised by Dr. Walid Abu-Sufah Jordan University Department of Computer Engineering.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
1 Implementation of IMS-based S-CSCF with Presence Service Jenq-Muh Hsu and Yi-Han Lin National Chung Cheng University Department of Computer Science &
Internet Telephony 1 Reference Architecture of R00.
EA C451 Vishal Gupta.
IP Multimedia Subsystem & W-CSCF
3GPP and SIP-AAA requirements
Discussion Issues on IMS-based NGN
Presentation transcript:

6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry

Introduction The IP Multimedia Subsystem (IMS) is a next-generation multimedia communication framework that encompasses mobile, fixed, packet-switching, and traditional circuit- switching communication systems. It has been proposed by the Third Generation Partnership Project (3GPP) and uses the Voice over Internet Protocol (VoIP) framework, especially the Session Initiation Protocol (SIP) standard. Selected Topics in Information Security – Bazara Barry

Introduction The goal of the IMS is to provide a wide spectrum of services with ease and consistency. These services include videoconferencing, Push-to-Talk (PTT),Text-to- Speech (TTS), instant messaging (IM), content sharing, and multipart gaming. To achieve this goal, IMS uses an open standard IP protocol and extension of SIP. Selected Topics in Information Security – Bazara Barry

Introduction It was driven originally by the 3GPP to boost the packet- switched services and attract more users to the packet- switched domain. To do so, it adds three important features in the GSM- based packet-switched network: 1.It requires QoS in a session 2.It adds a flexible charging mechanism. 3.It provides integrated to users. Selected Topics in Information Security – Bazara Barry

IMS architecture IMS goals also include a seamless handover of calls between fixed-line and mobile networks. Service providers can serve users irrespective of their location, access technology, or type of phone and Internetworking with existing phone systems is also allowed. Selected Topics in Information Security – Bazara Barry

IMS architecture IMS terminals can register directly into an IMS network when they roam in another network or country (the visited network). An IMS terminal can be a mobile phone or a fixed IP device attached to a Universal Integrated Circuit Card (UICC) with a user profile. The UICC is a removable smart card that contains a small data store for subscription information, authentication keys, a phonebook, and messages. These devices can use IPv6 and run SIP User Agents. Fixed access, mobile access, and wireless access are all supported. Selected Topics in Information Security – Bazara Barry

Core network The core network provides call control and handles mobility. It also takes care of high-level security, such as location updating and authentication. User database The Home Subscriber Service (HSS) is the central user database supporting IMS network entities that actually are handling the calls/sessions. It contains the user profiles, performs authentication and authorization of the user, and can provide information about the user’s physical location Selected Topics in Information Security – Bazara Barry

Call/Session Control Several types of SIP servers (proxies) collectively known as the Call/Session Control Function (CSCF), are employed to process SIP signaling packets in the IMS. A Proxy-CSCF (P-CSFC) is the first point-of-contact SIP server (in the signaling plane) when the UA tries to get into the system. It can be placed either in the visited network (in full IMS networks) or in the home network (when the visited network is not yet IMS compliant). Selected Topics in Information Security – Bazara Barry

Call/Session Control An Interrogating-CSCF (I-CSCF) is a SIP proxy located at the edge of an administrative domain. Its IP address is published in the DNS of the domain, so that remote servers can find it, and can use it as an entry point for all SIP packets to the domain. A Serving-CSFC (S-CSCF) is a SIP server, but performs session control as well and is located in the home network. It processes SIP registrations, which allows it to bind the user location (e.g., the IP address of the terminal) and the SIP address. Selected Topics in Information Security – Bazara Barry

Application Servers and interfaces An Application Server (AS) is a SIP component that offers value-added services like instant messaging and that resides either in the user’s home network or in a third party location. The I-CSCF or S-CSCF may use the Cx or Dx interface to assign an S-CSCF to a user, to download the authentication vector of the user, which is stored in the HSS, or to authorize the user to roam in a visited network. Selected Topics in Information Security – Bazara Barry

Simplified architecture Selected Topics in Information Security – Bazara Barry

Communication flow Selected Topics in Information Security – Bazara Barry

IMS security architecture All the UAs are authenticated before they are allowed to get into the system. The HSS is the central component for the security policy. It gives commands for what kinds of security algorithm is used and provides correct authentication information for all the users. Each UA or has built-in authentication information in the UICC. Selected Topics in Information Security – Bazara Barry

IMS security issues IMS was from its inception designed to be secure to eliminate many of the vulnerability issues that plague existing packet-based communication systems. The security of IMS has been especially fortified with the built- in security functions of IPv6. However, it is expected to take a substantial amount of time to fully migrate from the existing IPv4-based network to IPv6. Hence 3GPP came up with a compromise solution called early IMS. Selected Topics in Information Security – Bazara Barry

IMS security issues Full IMS security includes the security architecture that implements IPv6 and IPSec among IMS components. All user terminals (collectively called UE) have security keys and can encrypt messages as well as include digital signatures for secure authentication. These characteristics protect from eavesdropping, tampering with messages, and IP spoofing. Full IMS security also is designed to block potential replay attacks since the encryption is based on the random numbers generated by HSS that are valid for a certain period of time. Selected Topics in Information Security – Bazara Barry

References 1.T. Porter, Practical VoIP Security. Rockland, MA: Syngress, 2006, Ch 16.