"Security Issues and Challenges in IMS": A Paper Work On
"Security Issues and Challenges in IMS": A Paper Work On
On
MIT PUNE’s
MIT SCHOOL OF TELECOM MANAGEMENT
BY
DIVYA JAGWANI
PRN : 091049
Batch : 2009-2011
IN PARTIAL FULFILLMENT OF
POST GRADUATE DIPLOMA IN MANAGEMENT (PGDM)
MIT PUNE’s
MIT SCHOOL OF TELECOM MANAGEMENT
(MITSOT), PUNE
Security Issues and Challenges in IMS
Divya Jagwani
MIT School Of Telecom & Management
Pune, Maharashtra 411052 India
[email protected]
Abstract— In this paper i have covered many aspects of is a global standard that defines a generic architecture for
Security and potential threats faced by IMS offering VoIP and other multimedia services over the Internet,
technology.The most challenging thing faced by today's independent of access type – whether it is cellular (GPRS, 1x),
network operators is to meet subscribers exploding WLAN (WiFi), wireless broadband (WiMAX, EVDO Rev A,
demand and rapid growth of broadband Internet,and the HSPA) or wireline broadband (xDSL, Cable, FTTx). And
only appropriate solution offered by them is to offer new since IMS protocols are based on the open IETF(The IETF is
multimedia services anywhere, anytime. The IMS (IP the standardization body that has developed most of the
Multimedia Subsystem) is the technology that will merge protocols that are currently used on the Internet. The IETF
the Internet with the cellular world provide enriched does not standardize networks, architectures combining
srvices that enable subscribers to collaborate and different protocols, the internal behavior of nodes, or APIs
comunicate in real time. Such a resource is a valuable (Application Programming Interfaces). The IETF is the
asset and is creating a new level of security needs for the protocol factory for IP-related protocols) SIP specifications,
network operator that go beyond anything that has been any IMS network device can take advantage of the exploding
traditionally deployed. SIP adoption by other IP phones, adapters and soft clients.
The paper covers many security issues and solutions to IMS is also expected to bring the strengths of wireless and
prevent IMS network from malacious attacks.The paper is fixed-line worlds together. In 3GPP’s words: “The IMS
organized as follows. The next section provides an should enable the convergence of, and access to, voice,
overview of the IMS architecture with specific video, messaging, data and web-based technologies for the
consideration given to security and at last with suggested wireless user, and combine the growth of the Internet with
solutions to potential security threats. the growth in mobile communications.”
The 3rd Generation Partnership Project (3GPP) creates
Keywords: IMS; IMS Architecture; IMS vulnerabilities; security standards for those parts of the system that need to be
Potential Threats; Security Solutions standardized, never intending to standardize security
alternative available to carriers for IMS. What 3GPP
I. INTRODUCTION standardizes are security protocols between terminal and
IP Multimedia Subsystem (IMS) is a rapidly developing network, and interfaces between network elements so they can
standard that is meant to deliver multimedia applications interoperate. 3GPP also writes guidelines for others helping
through multiple wireless and wireline networks. them to secure IMS.
IP Multimedia Subsystem is a Session Initiation Protocol
(SIP)-based IP Multimedia infrastructure that provides a The three main features provided by IMS are :-
complete architecture and framework for real-time and non-
real-time IP multimedia services on the top of Packet 1.) 1.) QoS (Quality of Service) :- The main drawback with the
Switched (PS) core while still preserving the Circuit Switched packet-switched domain was that, the network does not
(CS) telephony services. IMS provides the necessary IMS provide any assurance about the amount of bandwidth a
Capabilities: service control, security functions (e.g. user gets for a particular connection and the amount of
authentication, authorization), routing, registration, SIP delay a connection is going to experience, in short offer
compression and QoS support, charging. IMS is a part of best-effort services without QoS and thus the quality of
standardization work for 3G mobile phone systems in UMTS VoIP conversation affects considerably. So, one of the
networks. It is the topic that turned upside down the reasons for creating the IMS was to provide the QoS
telecommunication world, that is meant to deliver multimedia required for enjoying, rather than suffering, real-time
applications through multiple wireless and wireline networks. multimedia sessions. The IMS takes care of synchronizing
The IP Multimedia Subsystem (IMS), first specified by the session establishment with QoS provision so that users
Third Generation Partnership Project (3GPP/3GPP2), is a key have a predictable experience.
enabler and service-delivery platform for these services. IMS
2.) Charging :- Unlike traditional charging systems, most of the signaling interfaces in the IMS, typically
another reason for creating the IMS was to be able to referred to by a two or three-letter code. We do not include
charge multimedia sessions appropriately, in which since all the interfaces defined in the IMS, but only the most
operators typically charge based on the number of bytes relevant ones.
transferred.. A user involved in a videoconference over the
packet-switched domain usually transfers a large amount On one side of Figure we can see the IMS mobile
of information (which consists mainly of encoded audio terminal, typically referred to as the User Equipment (UE).
and video).. The user’s operator cannot follow a different The IMS terminal attaches to a packet network, such as the
business model to charge the user because the operator is GPRS network, through a radio link. Note that, although
not aware of the contents of those bytes: they could belong the figure shows an IMS terminal attaching to the network
to a VoIP session, to an instant message, to a web page, or using a radio link, the IMS supports other types of devices
to an email. and accesses. PDAs (Personal Digital Assistants) and
On the other hand, if the operator is aware of the actual computers are examples of devices that can connect to the
service that the user is using, the operator can provide an IMS. Examples of alternative accesses are WLAN or
alternative charging scheme that may be more beneficial ADSL. The remainder of Figure shows the nodes included
for the user. For instance, the operator might be able to in the so-called IP Multimedia Core Network Subsystem.
charge a fixed amount for every instant message, These nodes are:
regardless of its size. Additionally, the operator may 1. one or more user databases, called HSSs (Home
charge for a multimedia session based on its duration, Subscriber Servers) and SLFs (Subscriber
independently of the number of bytes transferred. Location Functions);
The IMS does not mandate any particular business 2. one or more SIP servers, collectively known as
model. Instead, it lets operators charge as they think more CSCFs (Call/Session Control Functions);
appropriate. The IMS provides information about the 3. one or more ASs (Application Servers);
service being invoked by the user, and with this 4. one or more MRFs (Media Resource Functions),
information the operator decides whether to use a flat rate each one further divided into MRFC (Media
for the service, apply traditional time-based charging, Resource Function Controllers) and MRFP
apply QoS-based, or perform any new type of charging. (Media Resource Function Processors);
As a clarification, by service, in this charging context, we
refer to any value offered to the user (e.g., a voice session,
an audio/video session, a conference bridge, an instant
message, or the provision of presence information about
co-workers).
II. OVERVIEW OF IMS ARCHITECTURE 5. one or more BGCFs (Breakout Gateway Control
Functions);
1. IMS architecture 6. one or more PSTN gateways, each one
The below figure depicts an overview of the IMS decomposed into an SGW ( Signalling
architecture as standardized by 3GPP. The figure shows Gateway), an MGCF (Media Gateway
Controller Function), and an MGW(Media
Gateway).
IMS REQUIREMENTS
IMS aims to :
1. combine the latest trends in technology;
2. make the mobile Internet paradigm come true;
3. create a common platform to develop diverse
multimedia services;
4. create a mechanism to boost margins due to
extra usage of mobile packet-switched networks.
IMS Vulnerabilities :-
As mentioned at the outset, IMS and SIP enable a rich set of
converged services, but, at the same time, open up networks to
a host of known IP-based vulnerabilities, which can often be
addressed by existing firewalls, and also to a completely new
set of IMS application vulnerabilities. In fact, in the last three
years, the Sipera VIPER™ (Voice over IP Exploitation
Research) Lab has identified over 20,000 attacks that can be
launched against IMS networks..
Securing IMS
Securing IMS is a very tough task. To build an attack
mechanism for IMS is quite easy and inexpensive. The
potential threats for the IMS networks are as follows.the more
prevalent and potentially damaging application level threats
that can be used to attack the core infrastructure and take
down the service or used to attack the end-users are:
ii) Fuzzed messages can easily be transmitted using This is why securing IMS is a very difficult work to
encrypted and authenticated traffic, all the way to the do. Once hackers gain access to an IMS network and
IMS core. Existing security devices do not generally servers, they can commence toll fraud by acting as a
have the ability to decrypt the traffic at wire speeds, gateway between the local PSTN and the IMS
and look at all the details of the protocol (header, network, similar to last year’s publicized, million
body, content, etc.) to make sure there is no dollar toll fraud exacted on several VoIP networks.
malicious intent, and therefore cannot protect against
some of the most damaging attacks towards the vi) Building an Attack Tool is Easy : Compounding
infrastructure. the issue of threats is the fact that building an attack
vector takes very little investment in terms of time or
money. The required components are available free
of charge, as open-source software and all the
iii)Flood DoS and Distributed Floods: Flood DoS and required specifications are publicly available at the
DDoS attacks are those attacks whereby a malicious 3GPP website. Hackers, in a few days, can easily
user deliberately sends a tremendously large amount write scripts required to read U/I-SIM cards, which
of random messages to one or more core network are easily acquired and can be used to launch various
elements from either a single location (DoS) or from attacks.
End-
Mala Poin
ciou t
s (SIP
User Pho
ne)
deceptive practices. VoIP transactions are mostly typical examples are call rerouting, call black holing,
exposed to the confidentiality threat because most media injection, and media degrading.
VoIP service does not provide full confidentiality
(both signal and media) end-to-end. The threat
examples are eavesdropping media, call pattern i) Message Alteration: Message alteration is the threat
tracking, data mining, and reconstruction. that an attacker intercepts messages in the middle of
communication entities and alters certain information
i) Reconstruction: Reconstruction means any to reroute the call, change information, interrupt the
unauthorized reconstruction of voice, video, fax, text, service, and so on. The typical examples are call
or presence information after capturing the signals or rerouting and black holing.
media between parties. The reconstruction includes
monitoring, recording, interpretation, recognition, and ii) Media Alteration: Media alteration is the threat that an
extraction of any type of communications without the attacker intercepts media in the middle of
consent of all parties communication entities and alters media information to
inject unauthorized media, degrade the QoS, delete
ii) Data Mining: The general meaning of data mining in certain information, and so on. The media can be
VoIP is the unauthorized collection of identifiers that voice-only or integrated with video, text, fax, or image.
could be user name, phone number, password, URL, The typical examples are media injection and
email address, strings or any other identifiers that degrading
represent phones, server nodes, parties, or
organizations on the network.