scispace - formally typeset
Search or ask a question

Showing papers on "IP Multimedia Subsystem published in 2020"


Journal ArticleDOI
TL;DR: In this article, the authors evaluate the availability of multi-tenant SFC infrastructures, where every network function is modeled as a multi-state system and is shared among different and independent tenants.
Abstract: The Network Function Virtualization (NFV) paradigm has been devised as an enabler of next generation network infrastructures by speeding up the provisioning and the composition of novel network services. The latter are implemented via a chain of virtualized network functions, a process known as Service Function Chaining. In this paper, we evaluate the availability of multi-tenant SFC infrastructures, where every network function is modeled as a multi-state system and is shared among different and independent tenants. To this aim, we propose a Universal Generating Function (UGF) approach, suitably extended to handle performance vectors, that we call Multidimensional UGF. This novel methodology is validated in a realistic multi-tenant telecommunication network scenario, where the service chain is composed by the network elements of an IP Multimedia Subsystem implemented via NFV. A steady-state availability evaluation of such an exemplary system is presented and a redundancy optimization problem is solved, so providing the SFC infrastructure which minimizes deployment cost while respecting a given availability requirement.

20 citations


Journal ArticleDOI
TL;DR: A containerized IMS infrastructure, dubbed cIMS, is deriving, providing its assessment through statistical characterization and experimental measurements, and providing new means for the service provider to manage service level agreements (SLAs).
Abstract: The Next Generation 5G Networks can greatly benefit from the synergy between virtualization paradigms, such as the Network Function Virtualization (NFV), and service provisioning platforms such as the IP Multimedia Subsystem (IMS). The NFV concept is evolving towards a lightweight solution based on containers that, by contrast to classic virtual machines, do not carry a whole operating system and result in more efficient and scalable deployments. On the other hand, IMS has become an integral part of the 5G core network, for instance, to provide advanced services like Voice over LTE (VoLTE). In this paper we combine these virtualization and service provisioning concepts, deriving a containerized IMS infrastructure, dubbed cIMS, providing its assessment through statistical characterization and experimental measurements. Specifically, we: i) model cIMS through the queueing networks methodology to characterize the utilization of virtual resources under constrained conditions; ii) draw an extended version of the Pollaczek-Khinchin formula, which is useful to deal with bulk arrivals; iii) afford an optimization problem focused at maximizing the whole cIMS performance in the presence of capacity constraints, thus providing new means for the service provider to manage service level agreements (SLAs); $iv)$ evaluate a range of cIMS scenarios, considering different queuing disciplines including also multiple job classes. An experimental testbed based on the open source platform Clearwater has been deployed to derive some realistic values of key parameters (e.g. arrival and service times).

12 citations


Patent
Tsai Chih-Yuan1, Lee Chi-Chen1, Liu Te-Huang1, Wang Chin-Han1, Yeh Yu-Tien1 
18 Feb 2020
TL;DR: In this article, a wireless transceiver performs wireless transmission and reception to and from a first service network and a second service network using an evolved Packet Data Gateway (ePDG).
Abstract: A mobile communication device including a wireless transceiver and a wireless transceiver is provided. The wireless transceiver performs wireless transmission and reception to and from a first service network and a second service network. The controller uses a first subscriber identity card to establish one or more first radio bearers with the first service network via the wireless transceiver, uses a second subscriber identity card to set up an Internet Protocol Security (IPsec) tunnel with an evolved Packet Data Gateway (ePDG) of the second service network via the first radio bearers, and uses the second subscriber identity card to register an IP Multimedia Subsystem (IMS) service with the second service network via the IPsec tunnel.

10 citations


Journal ArticleDOI
TL;DR: An improved SIP authentication protocol is proposed that covers the limitations of Dongqing et al. protocol and is formally proved as secure using BAN logic analysis, which depicts the efficiency and robustness of the scheme over previous schemes.
Abstract: The IP multimedia subsystem represents an architectural framework to support multimedia-based services using internet protocol over wired and wireless media. These IP-based multimedia services rely on session initiation protocol (SIP) for creating, maintaining and terminating the communicative sessions, which underscores the efficiency and security of SIP protocol. Many SIP based authentication schemes have been put forward in the last decade, however with many limitations. Recently, Lu et al. and Chaudhary et al. presented SIP based authentication protocols. Then, Dongqing et al. discovered limitations in Lu et al. and Chaudhary et al. schemes, and presented an improved SIP authentication protocol. Nonetheless, we ascertain that Dongqing et al.’s protocol is prone to privileged insider attack, denial of service attack, and session specific ephemeral secret-leakage attack. Besides, this protocol assumes a strictly time synchronized system, which limits the practical effectiveness of the protocol for a real environment. We also propose an improved SIP authentication protocol that covers the limitations of Dongqing et al. protocol. Our scheme is formally proved as secure using BAN logic analysis. The performance analysis illustrates the comparison for related schemes with proposed scheme, which depicts the efficiency and robustness of the scheme over previous schemes.

10 citations


Book ChapterDOI
26 Aug 2020
TL;DR: In this article, the authors look at what the network standard for 5G voice service provision consists of, and what are the vulnerable problems in terms of security in 5G access networks.
Abstract: In April 2019, the world’s first 5G mobile communication was commercialized in South Korea. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communication, connection of at least 1 million devices per 1 km\(^2\), and 1 ms transmission delay which is 10 times shorter than 4G. To meet this, various technological developments were required, and various technologies such as Massive MIMO (Multiple-Input and Multiple-Output), mmWave, and small cell network were developed and applied in the area of 5G access network. However, in the core network area, the components constituting the LTE (Long Term Evolution) core network are utilized as they are in the NSA(Non-Standalone) architecture, and only the changes in the SA(Standalone) architecture have occurred. Also, in the network area for providing the voice service, the IMS (IP Multimedia Subsystem) infrastructure is still used in the SA architecture. Here, the issue is that while 5G mobile communication is evolving openly to provide various services, security elements are vulnerable to various cyber-attacks because they maintain the same form as before. Therefore, in this paper, we will look at what the network standard for 5G voice service provision consists of, and what are the vulnerable problems in terms of security. We also want to consider whether these problems can actually occur and what is the countermeasure.

10 citations


Proceedings ArticleDOI
16 Apr 2020
TL;DR: This work uncovers that the VoWi-Fi signaling session can be hijacked to maliciously manipulate the IMS call operation, and exploits a vulnerability of the 4G network infrastructure, call information leakage, which is explored using machine learning.
Abstract: IMS (IP Multimedia Subsystem) is an essential framework for providing 4G/5G multimedia services. It has been deployed worldwide to support two call services: VoLTE (Voice over LTE) and VoWi-Fi (Voice over Wi-Fi). VoWi-Fi enables telephony calls over the Wi-Fi network to complement VoLTE. In this work, we uncover that the VoWi-Fi signaling session can be hijacked to maliciously manipulate the IMS call operation. An adversary can easily make ghost calls to launch a stealthy call DoS (Denial of Service) attack against specific cellular users. Only phone numbers, but not any malware or network information, are required from the victims. This sophisticated attack harnesses a design defect of the IMS call state machine, but not simply flooding or a crash trigger. To stealthily detect attackable phones at run time, we exploit a vulnerability of the 4G network infrastructure, call information leakage, which we explore using machine learning. We validate these vulnerabilities in operational 4G networks of 4 top-tier carriers across Asia and North America countries with 7 phone brands. Our result shows that the call DoS attack can prevent the victims from receiving incoming calls up to 99.0% time without user awareness. We finally propose and evaluate recommended solutions.

7 citations


Journal ArticleDOI
TL;DR: A detailed performance assessment of VoIP traffic is proposed by carrying out experimental trials across a real LTE-A environment, proposing a statistical characterization of jitter and RTT (representing the most critical parameters), and identifying the optimal approximating distribution, namely the Generalized Extreme Value (GEV).
Abstract: Mobile telecommunications are converging towards all-IP solutions. This is the case of the Long Term Evolution (LTE) technology that, having no circuit-switched bearer to support voice traffic, needs a dedicated VoIP infrastructure, which often relies on the IP Multimedia Subsystem architecture. Most telecom operators implement LTE-A, an advanced version of LTE often marketed as 4G+, which achieves data rate peaks of 300 Mbps. Yet, although such novel technology boosts the access to advanced multimedia contents and services, telco operators continue to consider the VoIP market as the major revenue for their business. In this work, the authors propose a detailed performance assessment of VoIP traffic by carrying out experimental trials across a real LTE-A environment. The experimental campaign consists of two stages. First, we characterize VoIP calls between fixed and mobile terminals, based on a dataset that includes more than 750,000 data-voice packets. We analyze quality-of-service metrics such as round-trip time (RTT) and jitter, to capture the influence of uncontrolled factors that typically appear in real-world settings. In the second stage, we further consider VoIP flows across a range of codecs, looking at the trade-offs between quality and bandwidth consumption. Moreover, we propose a statistical characterization of jitter and RTT (representing the most critical parameters), identifying the optimal approximating distribution, namely the Generalized Extreme Value (GEV). The estimation of parameters through the Maximum Likelihood criterion, leads us to reveal both the short- and long-tail behaviour for jitter and RTT, respectively.

7 citations


Proceedings ArticleDOI
20 Apr 2020
TL;DR: An automated procedure is developed aimed at supporting the performability management of cIMS deployments that must satisfy the optimal trade-off among high availability requirements, capacity load, and deployment costs.
Abstract: IP Multimedia Subsystem (IMS) represents a crucial element for the convergence of telecommunication systems heading towards 5G solutions. Actually, IMS offers a standardized and vendor independent model allowing network providers to supply multimedia services such as video streaming or HD voice, with pressing QoS requirements. The IMS architecture can dramatically improve its flexibility when deployed within softwarized environments, in conjunction with virtual or container-based technologies. This latter, in particular, realizes an abstraction of software resources from the underlying hardware in a more efficient and resource saving manner than virtual machines. Inspired by this model, we propose a tool for the performability management of IMS architectures deployed in a containerized environment (dubbed cIMS). First, we model the stochastic behavior of a cIMS by means of two complementary formalisms: i) Reliability Block Diagram (RBD) amenable to model high level interconnections among cIMS nodes, and ii) Stochastic Reward Networks (SRN) useful to capture deeper details of a single node in terms of failure and repair events. Then, we develop an automated procedure aimed at supporting the performability management of cIMS deployments that must satisfy the optimal trade-off among high availability requirements, capacity load, and deployment costs.

5 citations


Journal ArticleDOI
TL;DR: In this article, the authors propose a detailed performance assessment of VoIP traffic by carrying out experimental trials across a real LTE-A environment, based on a data-set that includes more than 750,000 data-voice packets.
Abstract: Mobile telecommunications are converging towards all-IP solutions. This is the case of the Long Term Evolution (LTE) technology that, having no circuit-switched bearer to support voice traffic, needs a dedicated VoIP infrastructure, which often relies on the IP Multimedia Subsystem architecture. Most telecom operators implement LTE-A, an advanced version of LTE often marketed as $4{G} +$ , which achieves data rate peaks of 300 Mbps. Yet, although such novel technology boosts the access to advanced multimedia contents and services, telco operators continue to consider the VoIP market as the major revenue for their business. In this work, the authors propose a detailed performance assessment of VoIP traffic by carrying out experimental trials across a real LTE-A environment. The experimental campaign consists of two stages. First, we characterize VoIP calls between fixed and mobile terminals, based on a data-set that includes more than 750,000 data-voice packets. We analyze quality-of-service metrics such as round-trip time (RTT) and jitter, to capture the influence of uncontrolled factors that typically appear in real-world settings. In the second stage, we further consider VoIP flows across a range of codecs, looking at the trade-offs between quality and bandwidth consumption. Moreover, we propose a statistical characterization of jitter and RTT (representing the most critical parameters), identifying the optimal approximating distribution, namely the Generalized Extreme Value (GEV). The estimation of parameters through the Maximum Likelihood criterion, leads us to reveal both the short- and long-tail behaviour for jitter and RTT, respectively.

5 citations


Proceedings ArticleDOI
01 Dec 2020
TL;DR: In this article, an improved version of IMS-AKA is proposed to resist Spoofing attacks, SPIT and Dos-Synchronization, and a shared key is introduced at the end of the authentication process using Secure Real Time Protocol (SRTP).
Abstract: IP Multimedia Subsystem (IMS) is the main solution for new generation networks providing multiple services proposed by third generation partnership project (3GPP). IMS architecture is based on several protocols guaranteeing connection and data transmission. Among these protocols, Session Initiation protocol (SIP), which is regarded as the main IMS signalisation protocol, hence considered a target for several attacks. To secure this protocol, 3GPP proposed an authentication and key agreement protocol called IMS-AKA. However, this protocol suffers from weaknesses in terms of complexity and user identity protection. In this work, we are particularly interested in IMS- AKA+ protocol, an improved version of IMS-AKA. This work aims to analyse performances of IMS-AKA+ against IMS-AKA using simulation and AVISPA specification. Results showed that IMS-AKA+ outperforms IMS-AKA resisting to many security attacks such as Spoofing attacks, SPIT and Dos-Synchronization. In addition to this, we propose an initial approach toward securing media plane by introducing a shared key at the end of IMS-AKA+ process using Secure Real Time protocol (SRTP).

3 citations


Proceedings ArticleDOI
20 Apr 2020
TL;DR: This work proposes a framework useful to design and model, from a HA perspective, the Service Function Chains (SFCs) whose chained software logic is embodied in many softwarized telco infrastructures (e.g. IP Multimedia Subsystem elected here as a representative use case).
Abstract: The reputation of network providers strongly depends on their ability to guarantee high performance levels of virtualized infrastructures, and to maintain strict Quality-of-Service (QoS) requirements, thus, the concept of "five nines" or high availability (HA) is critical. It means that, on average, the continuity of a provided service cannot be violated for more than about five minutes per year. In this direction, we propose a framework useful to design and model, from a HA perspective, the Service Function Chains (SFCs) whose chained software logic is embodied in many softwarized telco infrastructures (e.g. IP Multimedia Subsystem elected here as a representative use case). The proposed framework interacts with TimeNET tool, and offers interesting functionalities such as: i) generating stochastic models of SFCs based on the SRN (Stochastic Reward Nets) formalism; ii) deploying network scenarios via drag-and-drop operations for basic users, or modifying the underlying SRN models for advanced users; iii) setting a variety of parameters (mean-time-to-failure/repair, software/hardware specs, redundancy, etc.); iv) presenting availability results in tabular and/or graphical forms.

Proceedings ArticleDOI
01 Jun 2020
TL;DR: This work proposes a statistical characterization of a containerized version of IP Multimedia Subsystem (cIMS), one of the crucial parts of 5G core network and exploits the Queueing Networks formalism to model the chained behavior of a cIMS infrastructure.
Abstract: Today, modern telco infrastructures are espousing softwarized paradigms (eg virtualization, containerization), which are necessary to implement the network slicing, and, consequently, to achieve a beneficial trade-off between service offered and costs In particular, container-based technologies, when compared to classic virtualized frameworks, offer a lightweight environment to host novel network services Inspired by these last trends, in this work we propose a statistical characterization of a containerized version of IP Multimedia Subsystem (cIMS), one of the crucial parts of 5G core network Precisely, we: i) exploit the Queueing Networks (QN) formalism to model the chained behavior of a cIMS infrastructure; ii) perform a statistical assessment aimed at analyzing both the queueing dynamics in different scenarios (single/multi class), and at selecting the optimal cIMS deployment guaranteeing the minimum response time at a given cost; iii) carry on an experimental analysis through Clearwater platform to extract realistic estimates of system parameters

Patent
Kim Laeyoung1
12 May 2020
TL;DR: In this paper, a method for transmitting/receiving an IP multimedia subsystem (IMS) voice support-related signal by a next generation-radio access network (NG-RAN) in a wireless communication system is described.
Abstract: An embodiment of the present invention relates to a method for transmitting/receiving an IP multimedia subsystem (IMS) voice support-related signal by a next generation-radio access network (NG-RAN) in a wireless communication system, the method comprising the steps of: receiving, by the NG-RAN, a request associated with a UE capability for IMS voice from an AMF; checking, by the NG-RAN, whether the UE capability matches network configurations; and transmitting, by the NG-RAN, a response including the result of the check to the AMF, wherein the network configurations include a network configuration for the NG-RAN and a network configuration for a network node which enables IMS voice even when the NG-RAN does not support IMS voice.

Journal ArticleDOI
TL;DR: This paper shows that virtualized IMS (vIMS) is unable to provide session-level resilience under faults and becomes the bottleneck to high service availability, and proposes a design to provide fault-tolerance for vIMS operations.
Abstract: Network function virtualization (NFV) of IP Multimedia Subsystem (IMS) pose promise to service increasing multimedia traffic demand. In this paper, we show that virtualized IMS (vIMS) is unable to provide session-level resilience under faults and becomes the bottleneck to high service availability. We propose a design to provide fault-tolerance for vIMS operations. In control-plane, our system decomposes single IMS operation into different atomic actions, and partition these actions into critical and non-critical actions. Only the critical actions are then monitored in real time and the system can easily resume IMS operations after failure. In data-plane, we decompose multimedia traffic flows and partition each multimedia service as a separate Virtualized Network Function (VNF). Through data-plane partitioning, our design restricts the damage from faults to only failed VNF. Thereafter, impacted service flow is merged with other ongoing service flows. We build our system prototype of open source IMS over virtualized platform. Our results show that we can achieve session-level resilience by performing fail-over procedure within tens of milliseconds under different combinations of IMS failures in both control-plane and data-plane operations.

Journal ArticleDOI
01 Jun 2020-Heliyon
TL;DR: Possible designs and analyses of flexible mobile service chaining to support end-to-end network slicing for dynamic service provisioning in order to provide a novel approach in the framework of the 5G technology, more especially from data and signaling based network perspectives are outlined.

Patent
Martinez Minguito Julio1
22 Apr 2020
TL;DR: In this article, the authors proposed a method of securing media across an IP Multimedia Subsystem, IMS, network where the media transits via first and second media gateway functions of the IMS network which are controlled by respective first-to-back Session Initiation Protocol, SIP, user agents.
Abstract: A method of securing media across an IP Multimedia Subsystem, IMS, network where the media transits via first and second media gateway functions of the IMS network which are controlled by respective first and second media gateway controllers acting as back-to-back Session Initiation Protocol, SIP, user agents. The method comprises sending from the first media gateway controller to the second media gateway controller, or to a node upstream of the second media gateway controller, security information of the first media gateway function, and using the sent information to secure media between the first and second media gateway functions or between the first media gateway function and said upstream node.

Patent
09 Jul 2020
TL;DR: In this paper, a mobile edge computing (MEC) host is used to determine whether IP multimedia subsystem (IMS) data can be transmitted and received between a first user equipment and a second user equipment.
Abstract: An electronic device is provided. The electronic device includes a processor and a memory operatively connected to the processor. The memory stores instructions that, when executed, cause the processor to determine that IP multimedia subsystem (IMS) data to be transmitted and received between a first user equipment and a second user equipment can be processed by the same mobile edge computing (MEC) host based on location information received from the first user equipment and the second user equipment, instruct the MEC host to activate an IMS processing function, and transmit an address of the activated IMS processing function of the MEC host to the first user equipment and the second user equipment. Other embodiments are possible.

Patent
13 Feb 2020
TL;DR: In this paper, a solution of supporting IP multimedia subsystem (IMS) call setup in a next generation system (5GS) is proposed, where the network sends indications to a user equipment (UE) indicating whether IMS voice over PS session (VoPS) over 3GPP access and over non-3GPP Access is supported or not.
Abstract: A solution of supporting IP multimedia subsystem (IMS) call setup in a next generation system (5GS) is proposed. During a registration procedure, the network sends indications to a user equipment (UE) indicating whether IMS voice over PS session (VoPS) over 3GPP access and over non-3GPP access is supported or not. The indications comprise two independent indicators, one indicator for indicating whether IMS VoPS is supported over 3GPP access, and the other indicator for indicating whether IMS VoPS is supported over non-3GPP access. In one example, the two independent indicators are included in a 5GS network feature support information element (IE) carried by a registration accept message sent from the network during the registration procedure.

Patent
02 Jan 2020
TL;DR: In this paper, a communication method, device and system are used for solving the problem that an IMS (IP Multimedia Subsystem) communication mode in the prior art cannot meet the service expansion requirement of terminal equipment.
Abstract: The invention discloses a communication method, device and system, which are used for solving the problem that an IMS (IP Multimedia Subsystem) communication mode in the prior art cannot meet the service expansion requirement of terminal equipment In the application, an access processing entity can forward a registration request of terminal equipment to a registration processing entity; after theregistration processing entity receives the registration request, address information of the service processing entity can be determined according to the service identifier, and a registration response message is sent to the access processing entity; wherein the registration response message comprises address information and a service identifier of the service processing entity; after the accessprocessing entity receives the registration response message, the corresponding relationship between the address information of the service processing entity and the service identifier can be stored,and when the terminal device needs to extend the service, the access processing entity can store the address information of the service processing entity and the corresponding service identifier, so that the service extension of the terminal device becomes possible

Patent
08 Jan 2020
TL;DR: In this paper, a method for improved handling of IP multimedia subsystem emergency calls and configuration of a user equipment being attached to a visited mobile communication network via a radio access network of or associated with the visited mobile communications network is presented.
Abstract: The invention relates to a method for improved handling of IP multimedia subsystem emergency calls and configuration of a user equipment being attached to a visited mobile communication network via a radio access network of or associated with the visited mobile communication network, wherein the method comprises - in dependency of an unregistered emergency call support indication related to the visited mobile communication network and to IP multimedia subsystem emergency calls - either a first and a second step, or the first and a third step:-- in the first step, the user equipment - while attaching or being attached to the visited mobile communication network - receives the unregistered emergency call support indication regarding the visited mobile communication network, the unregistered emergency call support indication being indicative of the visited mobile communication network either providing or not providing the possibility of an unregistered IP multimedia subsystem emergency call of the user equipment in case it is attached to the visited mobile communication network,-- in the second step subsequent to the first step, and in case that an IP multimedia subsystem emergency call needs to be initiated by the user equipment while the user equipment is attached to the visited mobile communication network, the user equipment initiates the IP multimedia subsystem emergency call as an unregistered emergency call in case that the unregistered emergency call support indication indicates that the visited mobile communication network does provide the possibility of an unregistered emergency call, and-- in the third step subsequent to the first step, and in case that an IP multimedia subsystem emergency call needs to be initiated by the user equipment while the user equipment is attached to the visited mobile communication network, the user equipment attempts to initiate an emergency registration with the visited mobile communication network in case that the unregistered emergency call support indication indicates that the visited mobile communication network does not provide the possibility of an unregistered emergency call, wherein in case of the emergency registration failing, the user equipment attempts to connect to a further visited mobile communication network in order to initiate an emergency call.

Patent
02 Jul 2020
TL;DR: In this paper, the authors present a system that enables users to use call capabilities of their mobile second numbers over a device wherein their first numbers are included without carrying a second device by means of a mobile application in a mobile IMS (IP Multimedia Subsystem).
Abstract: The present invention relates to a system (1) which enables users to use call capabilities of their mobile second numbers over a device wherein their first numbers are included without carrying a second device by means of a mobile application (3) in a mobile IMS (IP Multimedia Subsystem) network.

Patent
Stille Mats1, Keller Ralf
31 Jul 2020
TL;DR: In this paper, a method of managing registration of a UE with an IP Multimedia Subsystem (IMS) via a Long-Term Evolution (LTE) network is presented.
Abstract: The invention provides a method of managing registration of a User Equipment, UE, with an IP Multimedia Subsystem, IMS, via a Long-Term Evolution, LTE, network. The method comprises, following termination of a Voice over LTE, VoLTE, call, initiating a timer at the UE and, if no VoLTE call is initiated to or from the UE prior to expiry of the timer, then sending an IMS de-registration request fromthe UE to the IMS.

Patent
12 May 2020
TL;DR: In this paper, a method and a system for transmitting VoWiFi and VoLTE (Voice over Wireless Fidelity) call data is proposed, which consists of the following steps: establishing a Vo Wi-Fi call at a terminal, activating an IMS (IP Multimedia Subsystem) service bearer of LTE (Long Term Evolution) or maintaining the IMS service bearers of LTE activated before the Vo WiFi call is established by network equipment; and simultaneously maintaining dual-channel transmission of a WiFi mode and an LTE mode between the terminal and the network equipment.
Abstract: The invention provides a method and a system for transmitting VoWiFi (Voice over Wireless Fidelity) and VoLTE (Voice over Long Term Evolution) call data. The method comprises the following steps: establishing a VoWiFi call at a terminal; during the VoWiFi call, activating an IMS (IP Multimedia Subsystem) service bearer of LTE (Long Term Evolution) or maintaining the IMS service bearer of LTE activated before the VoWiFi call is established by network equipment; and simultaneously maintaining dual-channel transmission of a WiFi mode and an LTE mode between the terminal and the network equipment.

Patent
Hallenstal Magnus1
31 Jul 2020
TL;DR: In this paper, a method of registering a subscriber in an IP Multimedia Subsystem (IMS), said subscriber being associated with an IMS Private User Identity (IMPI) and an IMPU and further associated with a 4G or 5G conforming User Equipment (UE).
Abstract: A method of registering a subscriber in an IP Multimedia Subsystem (IMS), said subscriber being associated with an IMS Private User Identity (IMPI) and an IMS Public User Identity (IMPU) and further being associated with a 4G or 5G conforming User Equipment (UE). The method comprises: at the UE, generating a Temporary IMS Private User Identity (TIMPI) and a Temporary IMS Public User Identity (TIMPU) from a Globally Unique Temporary Identifier (GUTI) allocated by and received from a 4G or G network to temporarily identify the UE; sending an IMS registration request containing the TIMPI and the TIMPU from the UE to the IMS; at the IMS, using the TIMPI and the TIMPU to determine the GUTI, and communicating with the 4G or 5G network to determine, using the GUTI, an International Mobile Subscriber Identifier (IMSI) associated with the UE; at the IMS, using the IMSI to determine said IMPI and IMPU; and completing IMS registration of the subscriber using the IMPI and the IMPU.

Journal ArticleDOI
TL;DR: The aim of this work is choose and verify proper models for dimensioning of traffic in the HSS and describe the Markov M/M/1/K and M-M/m/K models and Erlang C formula.
Abstract: Our paper deals with structure of Home Subscriber Server in IP Multimedia Subsystem and mathematical models for optimizing this database. The aim of our work is choose and verify proper models for dimensioning of traffic in the HSS. In this paper we describe the Markov M/M/1/K and M/M/m/K models and Erlang C formula. Simulations are graphically interpreted in MATLAB and results are discussed.

Proceedings ArticleDOI
29 Oct 2020
TL;DR: In this article, a new model of proxy that is called Light-RTP-Engine-Proxy (LREProxy) is proposed for the transport data layer on Edge-Border IMS network.
Abstract: The IP Multimedia Subsystem is an architectural network for delivering IP multimedia services and data. The IMS network has built on three layers which allows for the convergence of different access networks. Each layer in IMS is consisting of various elements and protocols that consequently process signaling or media flow to specific application service. While the Call Session Control Function (CSCF) is the main route decision of the IMS network, the most significant of resources are used by routing and delivering media flow in Transport data layer in IMS network. With raising of request for service in IMS, the usage of resource have been increased. The ingress and egress nodes in IMS network are critical points and could potentially being bottleneck because they have to transmit huge signaling and media packets from and to IMS network. In this paper, we focused on Transport data layer on Edge-Border IMS network to manage and optimize its resources. We propose a new model of proxy that is called Light-RTP-Engine-Proxy (LREProxy). Also we implement our proposed paper as new module for Kamailio, Open Source SIP Server. We demonstrate how to use this module, the usage of resources in IMS network especially Edge-Border and IMS-Transit network have been significantly decreased.

Patent
07 Oct 2020
TL;DR: In this paper, the authors proposed a termination call handling for power saving activated user equipment (UE) using power saving functionality, comprising of obtaining power saving information of the UE; handling the terminating call based on the power-saving information.
Abstract: The embodiments herein relate to terminating call handling for power saving activated user equipment. In one embodiment, there proposes a method in a IP Multimedia Subsystem Application Server, IMS-AS, for handling a terminating call for a User Equipment, UE, using power saving functionality, comprising: obtaining power saving information of the UE; handling the terminating call based on the power saving information. With the embodiments, the time and network resource for the terminating call can be saved and the user's experience can be enhanced.

Patent
06 Feb 2020
TL;DR: In this article, the authors present a method for maintaining an association between at least one Serving Call Session Control Function, S-CSCF, server and a routing group for assigning the at least SSCF server to a user equipment based at least in part on the routing group.
Abstract: Methods and apparatuses are disclosed for Internet Protocol, IP, Multimedia Subsystem, IMS, routing. In one embodiment, a method includes maintaining an association between at least one Serving Call Session Control Function, S-CSCF, server and a routing group for assigning the at least one S-CSCF server to at least one user equipment based at least in part on the routing group. In another embodiment, a method includes identifying a target user equipment associated with a Session Initiation Protocol, SIP, request message; and communicating the SIP request message to a Proxy-Call Session Control Function, P-CSCF, without forwarding the SIP request message to an I-CSCF server, the P-CSCF associated with the identified target user equipment. In yet another embodiment, a method includes communicating a message to a collector for collecting user contact frequency statistics, the message including an indication of a target destination for an IMS session.

Patent
10 Dec 2020
TL;DR: In this article, a method for authentication of first user equipment, UE, for authenticating the first UE is provided, where an alert voice call is communicated to a second UE for initiating authentication of the first user.
Abstract: Apparatuses and methods for IMS slicing-enabled IMS voice sessions between autonomous machines and/or voice related services. A method for a first user equipment, UE, for authenticating the first UE is provided. An alert voice call is communicated to a second UE for initiating authentication of the first UE. A voiceprint of a user for the authentication of the first UE is communicated, via an IMS slice, and based at least in part on an analysis of the voiceprint, an authentication success message or an authentication fail message is received. A method for an Application Server includes receiving, via an IMS slice, a voiceprint of a user. The voiceprint is compared to a voiceprint sample. The voiceprint sample is associated with the first UE. Based at least in part on the comparison, an authentication success message or an authentication fail message is communicated.

Patent
14 May 2020
TL;DR: In this paper, a SUPL (Secure User Plane Location) Enabled Terminal (SET) is used to send an emergency call to a Call Session Control Function (CSCF) entity of an IP Multimedia Subsystem (IMS).
Abstract: A method, executed by a SUPL (Secure User Plane Location) Enabled Terminal (SET), is provided. The method includes the steps of: sending an INVITE request for an emergency call to a Call Session Control Function (CSCF) entity of an IP Multimedia Subsystem (IMS); and receiving a response to the INVITE request from the CSCF entity, wherein the response includes an SUPL INIT message.