2006
DOI: 10.1002/bltj.20143
|View full text |Cite
|
Sign up to set email alerts
|

IMS security

Abstract: deployments of NGNs and must provide equivalent or better security than existing network solutions. In order to accomplish this goal, IMS security needs to be addressed in a comprehensive way to ensure that security needs are understood, standardized solutions are implemented, and security processes are in place to continually advance security as IMS evolves. ITU Telecommunications Standardization Sector (ITU-T) Recommendation X.805, "Security Architecture for Systems Providing End-to-End Communications," is a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…where the parameter  is the tolerance parameter which reflects the resistance to the attacks and malfunctions, According to the actual situation, (0) k L is calculated by Eq. (14) and the capacity k C of node k is calculated by Eq. (15) in our simulations.…”
Section: R R Rmentioning
confidence: 99%
See 1 more Smart Citation
“…where the parameter  is the tolerance parameter which reflects the resistance to the attacks and malfunctions, According to the actual situation, (0) k L is calculated by Eq. (14) and the capacity k C of node k is calculated by Eq. (15) in our simulations.…”
Section: R R Rmentioning
confidence: 99%
“…Furthermore, the vulnerability of IP multimedia subsystem implementations and high level service provider security demands were examined. And then an implementation method to provide the desired degree of safety for IP multimedia subsystem deployments was defined [14]. Considering that communications service provider must determine how to handle the influences of security flaws, a new method was emphasized in reference [15], with examples to determine the influence of safety-related malfunctions and the key design elements which are related with modeling service reliability.…”
Section: Introductionmentioning
confidence: 99%
“…3GPP2 [14] and 3GPP [15] proposed solutions for IP-based services of IMS. Researchers at Bell Labs [16] examined the threats and vulnerabilities of IMS implementations. Several companies also provided their security solutions for IMS in 3G networks [17] [18].…”
Section: Related Workmentioning
confidence: 99%
“…The concept of pseudo identity provides much-needed privacy, confidentiality and security for all user service transactions. This infrastructure is also required for providing secure transactions that can easily be enhanced with evolving technologies such as IP Multimedia System (IMS), Web service and single sign-on (SSO) (The subject of security in the IMS architecture is discussed more fully in [10]). …”
Section: Wireless Operator Differentiatorsmentioning
confidence: 99%