Security Enhancement Architectural Model for IMS based Networks
نویسندگان
چکیده
منابع مشابه
IMS Security Analysis using Multi-attribute Model
IP Multimedia Subsystem (IMS) plays as a core platform in next-generation-network architecture, which advocates for an open and inter-operable service infrastructure. However, over the years, not much attention has been paid to the security problem of IMS. The time has come to now address security issues. This paper proposes a multi-attribute stereo model based on X.805 standard, which addresse...
متن کاملA Model-Based Resilience Analysis for IMS
IMS (IP Multimedia Subsystem) has become the basis of fixed-mobile convergence for telecommunication operators. Compared to previous networks, IMS presents huge advantages, especially in terms of its ability to offer all types of services (voice and data). Nevertheless, with these advantages comes a whole new package of resilience (dependability & security) challenge, e.g., attacks, human mista...
متن کاملProposed Model for SIP Security Enhancement
This paper aims to examine the various methods of protecting and securing a SIP architecture and also propose a new model to enhance SIP security in certain selected, specific and confidential environments as this proposed method cannot be generalized. Several security measures and techniques have already been experimented with, proposed and implemented by several authors as SIP security is an ...
متن کاملA Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کاملArchitectural Model for Information Security Analysis of Critical Information Infrastructures
Critical Information Infrastructures (CII) are computer systems and networks that support and control operations of many critical infrastructures that our society depends on, such as power plants, electrical grids, and water and waste facilities. Since the operations of CII also effect physical world, they are a good example of large-scale, critical cyber-physical systems. In recent years, CII ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Science and Technology
سال: 2016
ISSN: 0974-5645,0974-6846
DOI: 10.17485/ijst/2016/v9i46/107348