Securing the IP Multimedia Subsystem with IPsec and HTTP Digest

Mohammed Ibrahim Omar, Dr. Cheruiyot W. Kipruto, Dr. Michael W. Kimwele


Modern Telecommunication networks were combined from two communications: cellular networks and the Internet. The Internet Protocol Multimedia Subsystem (IMS) is the key element in the Modern Telecommunication networks architecture that makes it possible to provide wide range cellular access to all the services that the Internet provides. So, IMS is a great achievement in the communication world with advantage to maintain single communication platform for all but the big challenge is to maintain an adequate security level in this different network environment. IMS is based principally on IP protocol. Therefore, it inherits the security issues of IP networks. The IMS architecture is open, distributed and it has the advantage of being flexible in its implementation and deployment. This generates a variety of communication interfaces, which can make the system very vulnerable to attack. Add to that, the services offered on the IMS network must be provided by ensuring confidentiality and respect the privacy of users. Therefore, it is necessary to secure the IMS network at every level of its architecture including the final customer or subscriber device. Solutions like firewalls, anti-spy ware and antivirus systems failed to counter the emerging threats because they only target specific types of threats. In this study we are proposing security approach which is a Combination model composed of two protocols IPsec and HTTP digest.


Internet Protocol Multimedia Subsystem (IMS); Internet Protocol Security (IPsec); HTTP.

Full Text:



Travis Russell. The IP Multimedia Subsystem ( Session Control & Other Network Operations ). New York Chicago San Francisco: McGraw-Hill Companies, 2008, PP 19-178.

Chi-Yuan Chen, Tin-Yu Wu.“An efficient end-to-end security mechanism for IP”, Computer Communication,vol 3,pp 4259–4268, 2008.

Chalamalsetty K.“Architecture for IMS Security to Mobile: Focusing on Artificial Immune System and Mobile Agents Integration”, Master Thesis Computer Science Thesis no: MCS-2009:24, 2009.

E.Belmekkia, B.Raouyane. “Towards a New Approach for Securing IMS Networks”, Networks Labotatory, Institut nationale de Poste et Telecommunication, vol 4, pp 138 – 146, 2013

Gonzalo Camarillo and Miguel A. Garcia-Martin. The 3G IP Multimedia Subsystem ( IMS ) Merging the Internet and the cellular worlds. Chichester, England: John Wiley & Sons, 2006, pp 213-229.

Gelogo, D. S.” Securing IP Multimedia Subsystem with the appropriate Security Gateway and IPSec Tunneling”. Journal of Security Engineering, vol 8, 2011, pp 306-791.

Kai Shuang, Siyuan Wang.” IMS Security Analysis using Multi-attribute Model”. JOURNAL OF NETWORKS, VOL. 6 NO. 2, 2011

Dong Wang and Chen Liu, "Model-based Vulnerability Analysis of IMS Network", Journal of Networks, vol. 4, no.4, June 2009.ETSI TS 102 165-1 V4.2.3, 2011-03

Michail Tsag karo, T. D. ”Securing IP multimedia subsystem: (IMS) infrastructures: protection against attacks”. FITCE Congress., Session 07, Paper 05, 2008.


  • There are currently no refbacks.

Comments on this article

View all comments





About IJC | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

IJC is published by (GSSRR).