IMS Security Analysis using Multi-attribute Model

نویسندگان

  • Kai Shuang
  • Siyuan Wang
  • Bo Zhang
  • Sen Su
چکیده

IP Multimedia Subsystem (IMS) plays as a core platform in next-generation-network architecture, which advocates for an open and inter-operable service infrastructure. However, over the years, not much attention has been paid to the security problem of IMS. The time has come to now address security issues. This paper proposes a multi-attribute stereo model based on X.805 standard, which addresses a comprehensive, top-down, end-to-end perspective for IMS security analysis, classification and assessment. Besides, a detailed threat analysis of IMS is demonstrated and the vulnerability utilized by the threat is also presented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spatial analysis of social pathology in Iran from the perspective of social geography using the Cocoso technique

Aims and Background: One of the issues that have a great contribution in achieving social comfort and welfare is security and analysis of its related components. The present study was conducted with the aim of social pathology and analyzing indicators related to social security in Iran by using the combined compromise solution, which is one of the new multi-attribute decision-making techniques....

متن کامل

Efficient Selection of Design Parameters in Multi-Objective Economic-Statistical Model of Attribute C Control Chart

Control chart is the most well-known chart to monitor the number of nonconformities per inspection unit where each sample consists of constant size. Generally, the design of a control chart requires determination of sample size, sampling interval, and control limits width. Optimally selecting these parameters depends on several process parameters, which have been considered from statistical and...

متن کامل

Enhancing the Security and Reliability for Data Transmission in Wireless Networks

Microwave Access (WiMAX) and Long-Term Evolution (LTE) are considered the best technologies for vehicular networks. WiMAX and LTE are Fourth-Generation (4G) wireless technologies that have well-defined quality of service (QoS) and security architectures.Existing work QoS-aware distributed security architecture using the elliptic curve Diffie– Hellman (ECDH) protocol that has proven security str...

متن کامل

Model-based Vulnerability Analysis of IMS Network

IP Multimedia Subsystem (IMS) as the core of Next Generation Network (NGN), its security is vital important. However, IMS is a network with openarchitecture based on IP, which brings a lot of security issues. There has already some research results about IMS security, but systematic and model-based research results are lacked. Based on TVRA method, this paper establishes a comprehensive vulnera...

متن کامل

ملزومات امنیتی پیاده‌سازی IMS SIP سرور امن

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNW

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011