Implementing Security in an IP Multimedia Subsystem (IMS) Next Generation Network – a Case Study
Total Page:16
File Type:pdf, Size:1020Kb
IMPLEMENTING SECURITY IN AN IP MULTIMEDIA SUBSYSTEM (IMS) NEXT GENERATION NETWORK – A CASE STUDY By Jose M. Ortiz-Villajos A Thesis Submitted to the Faculty of The College of Engineering and Computer Science in Partial Fulfillment of the Requirements for the Degree of Master of Science Florida Atlantic University Boca Raton, Florida April 2009 ABSTRACT Author: Jose M. Ortiz-Villajos Title: Implementing Security in an IP Multimedia Subsystem (IMS) Next Generation Network – A Case Study Institution: Florida Atlantic University Dissertation Advisor: Dr. Eduardo Fernandez Degree: Master of Science Year: 2009 The IP Multimedia Subsystem (IMS) has gone from just a step in the evolution of the GSM cellular architecture control core, to being the de-facto framework for Next Generation Network (NGN) implementations and deployments by operators world-wide, not only cellular mobile communications operators, but also fixed line, cable television, and alternative operators. With this transition from standards documents to the real world, engineers in these new multimedia communications companies need to face the task of making these new networks secure against threats and real attacks that were not a part of the previous generation of networks. We present the IMS and other competing frameworks, we analyze the security issues, we present the topic of Security Patterns, we introduce several new patterns, including the basis for a Generic Network pattern, and we apply these concepts to designing a security architecture for a fictitious 3G operator using IMS for the control core. ii IMPLEMENTING SECURITY IN AN IP MULTIMEDIA SUBSYSTEM (IMS) NEXT GENERATION NETWORK – A CASE STUDY TABLES...................................................................................................................................................... viii FIGURES .......................................................................................................................................................ix GLOSSARY...................................................................................................................................................xi ACRONYMS ................................................................................................................................................xx PART A VOICE OVER IP AND MULTI-MEDIA NETWORKS................................................................1 1 INTRODUCTION...................................................................................................................................2 1.1 Motivation.........................................................................................................................................2 1.2 Telecom Provider Security Concerns................................................................................................3 1.3 Thesis Outline ...................................................................................................................................5 2 CURRENT NGN SERVICES AND TECHNOLOGY ...........................................................................8 2.1 Consumers.........................................................................................................................................8 2.2 Operators.........................................................................................................................................10 2.2.1 Telcos and Wireless...............................................................................................................10 2.2.2 Cable Companies...................................................................................................................14 2.2.3 New entrants..........................................................................................................................16 2.3 Standards.........................................................................................................................................16 2.3.1 3GPP/3GPP2 .........................................................................................................................16 2.3.2 TISPAN.................................................................................................................................17 2.3.3 PacketCable...........................................................................................................................18 2.3.4 IETF ......................................................................................................................................20 2.4 Regulatory Mandates ......................................................................................................................21 2.4.1 Lawful Interception (LI)........................................................................................................21 iii 2.4.2 Emergency Services ..............................................................................................................23 2.5 Current Security Standards .............................................................................................................24 2.5.1 3GPP......................................................................................................................................25 2.5.2 CableLabs PacketCable .........................................................................................................26 2.5.3 ETSI TISPAN........................................................................................................................26 3 THE IP MULTIMEDIA SUBSYSTEM (IMS).....................................................................................28 3.1 IMS Basics......................................................................................................................................28 3.2 Logical Functions............................................................................................................................32 3.3 Reference Points .............................................................................................................................34 3.4 Design Principles ............................................................................................................................37 3.4.1 Separation of Applications, Control, and Media ...................................................................39 3.4.2 Access Network Independence..............................................................................................40 3.4.3 Avoidance of Duplication of Common Resources ................................................................42 3.4.4 Re-use of Internet Open Interfaces and Technology .............................................................43 3.4.5 Decoupling of User-Device Identity......................................................................................44 3.4.6 Operator Control of Security, QoS, Charging .......................................................................45 3.5 Some Published IMS Announcements............................................................................................46 3.5.1 Verizon ..................................................................................................................................48 3.5.2 KPN.......................................................................................................................................49 3.5.3 Telia Sonera...........................................................................................................................49 3.5.4 AT&T....................................................................................................................................50 3.5.5 China Telecom ......................................................................................................................51 3.5.6 Chungwha Telecom...............................................................................................................52 3.5.7 Com Hem ..............................................................................................................................52 3.5.8 Vodafone ...............................................................................................................................52 3.5.9 Telefonica..............................................................................................................................52 3.5.10 North American Cable Companies (MSO’s).........................................................................53 4 OTHER NEXT GENERATION NETWORKS ....................................................................................54 iv 4.1 CableLabs PacketCable 2.0.............................................................................................................54 4.1.1 PacketCable 2.0 Architecture ................................................................................................55 4.2 TISPAN ..........................................................................................................................................58 4.3 Multiservice Switching Forum........................................................................................................61 5 ABSTRACTING THE NETWORK .....................................................................................................64 5.1 Functions in IP-based Communications Networks .........................................................................64 5.2 Network Element Classification .....................................................................................................65