33,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 1-2 Wochen
payback
17 °P sammeln
  • Broschiertes Buch

IP multimedia subsystem (IMS) is a rising "platform for provisioning multimedia services (e.g., data, voice, and video) in 4G/5G systems. IMS "authentication is an essential methodology which grants legitimate users access to multimedia services. However, periodic re-validation of portable clients (mobile users) results in significant signalling traffic overhead due to the complete execution of the hectic procedure. Additionally, signalling protocol, for example, SIP overlooks clients' secrecy by leaving the unprotected public and private identities. In IMS every client entering from another…mehr

Produktbeschreibung
IP multimedia subsystem (IMS) is a rising "platform for provisioning multimedia services (e.g., data, voice, and video) in 4G/5G systems. IMS "authentication is an essential methodology which grants legitimate users access to multimedia services. However, periodic re-validation of portable clients (mobile users) results in significant signalling traffic overhead due to the complete execution of the hectic procedure. Additionally, signalling protocol, for example, SIP overlooks clients' secrecy by leaving the unprotected public and private identities. In IMS every client entering from another network like UMTS or VOLTE needs to validate itself. Initial Registration of VoLTE is unprotected so that it can be used by any eavesdropper to get user identities and use them for future attacks. Along these lines, IMS core entities are influenced by high signalling that could be a source of the clog. The Session Initiation Protocol (SIP) is utilized as a part of IMS to build up and oversee sessions. The AKA algorithm is used for authentication of UE with servers.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
El Dr. N.Z Jhanjhi trabaja actualmente como profesor asociado, director del Centro para la Sociedad Inteligente 5.0 [CSS5] y jefe del clúster de Ciberseguridad, en la Escuela de Ciencias e Ingeniería Informática de la Facultad de Innovación y Tecnología de la Universidad de Taylor, Malasia.