Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Security for IP multimedia services in the 3GPP third generation mobile system

Security for IP multimedia services in the 3GPP third generation mobile system This paper surveys the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system which is known in Europe as UMTS. The main features of the security architecture include user specific features protecting the access of the IMS user, such as authentication and key agreement when a user registers and integrity protection of IMS access signalling, but also features for the user, independent protection of SIP signalling in the IMS core network. Authenticated registration is given an in‐depth treatment. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Internet Research Emerald Publishing

Security for IP multimedia services in the 3GPP third generation mobile system

Internet Research , Volume 13 (2): 7 – May 1, 2003

Loading next page...
 
/lp/emerald-publishing/security-for-ip-multimedia-services-in-the-3gpp-third-generation-PDRmZxMdMX

References (20)

Publisher
Emerald Publishing
Copyright
Copyright © 2003 MCB UP Ltd. All rights reserved.
ISSN
1066-2243
DOI
10.1108/10662240310469051
Publisher site
See Article on Publisher Site

Abstract

This paper surveys the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system which is known in Europe as UMTS. The main features of the security architecture include user specific features protecting the access of the IMS user, such as authentication and key agreement when a user registers and integrity protection of IMS access signalling, but also features for the user, independent protection of SIP signalling in the IMS core network. Authenticated registration is given an in‐depth treatment.

Journal

Internet ResearchEmerald Publishing

Published: May 1, 2003

Keywords: Security; Mobile communications; Multimedia; Access control; Internet

There are no references for this article.