Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
SWOT Analysis of IP Multimedia Sub System Security Authentication Schemes
Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
2009 (English)Independent thesis Advanced level (degree of Master (Two Years))Student thesisAlternative title
SWOT Analysis of IP Multimedia Sub System Security Authentication Schemes (Swedish)
Abstract [en]

SWOT analysis is performed on IMS security authentication schemes to demonstrate the effectiveness of each schemes in terms of multiple parameters and associated dependencies for users and network operators. Due to SWOT tool we have been able to describe strengths, weakness, opportunities and threats in each authentication scheme separately. The analysis performed mostly based on the state of art studies, SWOT tool itself approximates authentication schemes but in the discussion chapter we illustrated clearly what is necessary to adopt individually between Non SIM and SIM base authentication schemes. It will help MOBICOME project and network operators to choose the most appropriate authentication technology/ technologies for design and implementation.

Abstract [sv]

In this thesis we have accomplish SWOT analysis of IMS security authentication schemes for IMS network services. SWOT analysis for IMS security authentication schemes are divided into two main categories i.e. SIM based authentication and Non SIM based authentication. Analysis results provided strengths, weaknesses, opportunities and threats about an individual authentication scheme. The selection of authentication scheme is important for design and development within the MOBICOME project. SWOT analysis tool itself exhibit necessary information for advantages and disadvantages. The study holds significance, because of IMS deployment in the FMC environment to achieve seamless access to the services. The goal of the thesis was achieved by defining and selecting the most appropriate authentication schemes after conducting SWOT analysis in Chapters 5 & 6.

Place, publisher, year, edition, pages
2009. , 48 p.
Keyword [en]
SWOT Analysis, IMS, Security Authentication.
National Category
Signal Processing Telecommunications
Identifiers
URN: urn:nbn:se:bth-4781Local ID: oai:bth.se:arkivex4E3D0519DA5E203BC12575C40048F6A5OAI: oai:DiVA.org:bth-4781DiVA: diva2:832129
Uppsok
Technology
Supervisors
Note
syedmaji@gmail.com, +46-736805771Available from: 2015-04-22 Created: 2009-05-28 Last updated: 2015-06-30Bibliographically approved

Open Access in DiVA

fulltext(538 kB)215 downloads
File information
File name FULLTEXT01.pdfFile size 538 kBChecksum SHA-512
9cac2542826d7823d60ee9b4f2f8a93778456a8132e443d0d86d226b2b3e8ab057a46ef54d65b1f9d445c63790ab2da8434d35f3efcd2204f5a08f856247c53b
Type fulltextMimetype application/pdf

By organisation
Department of Telecommunication Systems
Signal ProcessingTelecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 215 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 195 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf