Entity authentication
UMTS provides mutualSignalling data integrity and origin authentication
* Integrity algorithm agreement: the mobile station and the serving network can securely negotiate the integrity algorithm that they use. * Integrity key agreement: the mobile and the network agree on an integrity key that they may use subsequently; this provides entity authentication.User traffic confidentiality
* Ciphering algorithm agreement: the mobile station and the network can securely negotiate ciphering algorithm that they use. * Cipher key agreement: the mobile station and the network agree on a cipher key that they may use. * Confidentiality of user and signalling data: neither user data nor sensitive signalling data can be overheard on the radio access interface.Network domain security
The term ‘network domain security’ in the 3G covers security of the communication between network elements. In particular, the mobile station is not affected by network domain security. The two communicating network elements may both be in the same network administrated by a mobile operator or they may belong to two different networks.MAPSEC
The basic idea of MAPSEC can be described as follows. The plaintext MAP message is encrypted and the result is put into a ‘container’ in another MAP message. At the same time a cryptographic checksum, i.e. a message authentication code covering the original message, is included in the new MAP message. To be able to use encryption and message authentication codes, keys are needed. MAPSEC has borrowed the notion of a security association (SA) fromIP multimedia system security
The IP multimedia subsystem (IMS) is a core network subsystem within UMTS. It is based on the use of the Session Initiation Protocol (SIP)26 to initiate, terminate and modify multimedia sessions such as voice calls, video conferences, streaming and chat. SIP is specified by the Internet Engineering Task Force (IETF)27. IMS also uses the