Investigation IMS architecture According to Security and QoS context
dc.contributor.author | Ajal, Muhammad | |
dc.contributor.author | Raja Muhammad, Shamayel Ulraja | |
dc.contributor.department | Chalmers tekniska högskola / Institutionen för data- och informationsteknik (Chalmers) | sv |
dc.contributor.department | Chalmers University of Technology / Department of Computer Science and Engineering (Chalmers) | en |
dc.date.accessioned | 2019-07-03T13:28:57Z | |
dc.date.available | 2019-07-03T13:28:57Z | |
dc.date.issued | 2014 | |
dc.description.abstract | Next Generation Network moved towards full IP- based network. In NGN, various types of services are provided by CSCF – Control Service Control Function called as IMS- IP Multimedia Subsystem. IMS is located in service layer of NGN architecture. IMS network provides services to several terminals as wire and wireless independently of access network. Hence, NGN – IMS has common service control architecture. Networks are based on data and components. These are open and regulated. Security rises in this scenario when an unauthorized access is being accomplishing. As a collectively it is considered as network security. Security requirements and mechanisms are based on various techniques. Security polices and protocols are set by standardized bodies and security experts as well. Security solutions are implemented by investigation of their architectural framework. In IMS network, security architecture is under further researched. International bodies as UMTS and 3GPP provides framework to best analyzed in security requirement. UMTS AKA authentication and key agreement implements on user and operator level. KMS based security solution is a proposed model to secure both entities of IMS network i.e. Operator and User level security. Separation of these entities invokes security concern to network operator and user as well. Mechanism is a different approach. This will be done by implementing security procedure in terms of enhanced authentication, attacks detection and cryptographic analysis. Analysis and results are evaluated on the basis of foresaid protocols and mechanisms. Satisfaction of success is to delivery of contents with no interception and delay in reception. This comes under a separate service i.e. Quality of Service – QoS. Achievement of good quality in service delivery is done by policy based management. Solution is to set policy on appropriate entities within a network. | |
dc.identifier.uri | https://hdl.handle.net/20.500.12380/202662 | |
dc.language.iso | eng | |
dc.setspec.uppsok | Technology | |
dc.subject | Data- och informationsvetenskap | |
dc.subject | Computer and Information Science | |
dc.title | Investigation IMS architecture According to Security and QoS context | |
dc.type.degree | Examensarbete för masterexamen | sv |
dc.type.degree | Master Thesis | en |
dc.type.uppsok | H |
Ladda ner
Original bundle
1 - 1 av 1
Hämtar...
- Namn:
- 202662.pdf
- Storlek:
- 1.16 MB
- Format:
- Adobe Portable Document Format
- Beskrivning:
- Fulltext