ABSTRACT

Introduction............................................................................................................28 IMS.Architectural.Overview............................................................................... 29 IMS.Security.Challenges.and.Potential.Attacks............................................... 32 IMS.Security.Mechanisms.and.Security.Associations....................................35 IMS.Authentication,.Key.Management,.and.Secrecy....................................... 39

IMS.Authentication.and.Key.Management.............................................. 39 Encryption.and.Secrecy............................................................................... 41

Use.of.IPsec.ESP.for.SIP.Confidentiality.and.Integrity. Protection............................................................................43