2006
DOI: 10.1002/bltj.20190
|View full text |Cite
|
Sign up to set email alerts
|

Optimal availability and security for IMS-based VoIP networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…In addition, IMS nodes have typically different performance levels and several failure and repair modes with various effects on the entire signaling network performance. Hence, a reliability/performance model should consider this distributed nature of call control functionalities, influenced by every single node behavior and the variety of failures, ranging from accidental failures [15] of software modules and/or hardware equipments to man-made faults due to malicious users activity [16], [17], [18].…”
Section: The Ip Multimedia Subsystemmentioning
confidence: 99%
“…In addition, IMS nodes have typically different performance levels and several failure and repair modes with various effects on the entire signaling network performance. Hence, a reliability/performance model should consider this distributed nature of call control functionalities, influenced by every single node behavior and the variety of failures, ranging from accidental failures [15] of software modules and/or hardware equipments to man-made faults due to malicious users activity [16], [17], [18].…”
Section: The Ip Multimedia Subsystemmentioning
confidence: 99%
“…Given the complexity of NGN networks arising from their distributed nature and the potential multivendor mismatch of products in an NGN solution, the human factors-maintainability and serviceability of NGN/IMS networks-will become a significant issue for service reliability. Another example of a nontraditional failure source is cyber-terrorism because NGNs rely on new technologies and protocols that are generally IP-based and more prone to man-made threats [4,14]. Each non-traditional failure source impacts service reliability and hence this impact needs to be accounted for in order to understand the reliability.…”
Section: Introductionmentioning
confidence: 99%
“…organization and In terms of service, we offer several internet services We have created the SaaS level, which is for the service user Three to provide different customized services are virtualized into six, security is in place Concerns. [13] This fact makes IMS networks vulnerable to specific security weaknesses associated with other IP networks and MS protocols such as SIP. The key used by the client to establish a session with MS Core This is the last protocol.…”
Section: Introductionmentioning
confidence: 99%