SWOT Analysis of IP Multimedia Sub System Security Authentication Schemes

University essay from Blekinge Tekniska Högskola/Sektionen för Teknik (TEK)

Abstract: SWOT analysis is performed on IMS security authentication schemes to demonstrate the effectiveness of each schemes in terms of multiple parameters and associated dependencies for users and network operators. Due to SWOT tool we have been able to describe strengths, weakness, opportunities and threats in each authentication scheme separately. The analysis performed mostly based on the state of art studies, SWOT tool itself approximates authentication schemes but in the discussion chapter we illustrated clearly what is necessary to adopt individually between Non SIM and SIM base authentication schemes. It will help MOBICOME project and network operators to choose the most appropriate authentication technology/ technologies for design and implementation.

  AT THIS PAGE YOU CAN DOWNLOAD THE WHOLE ESSAY. (follow the link to the next page)