ISBN-13: 9783838374956 / Angielski / Miękka / 2010 / 52 str.
SWOT analysis is performed on IMS security authentication schemes to demonstrate the effectiveness of each schemes in terms of multiple parameters and associated dependencies for users and network operators. Due to SWOT tool we have been able to describe strengths, weakness, opportunities and threats in each authentication scheme separately. The analysis performed mostly based on the state of art studies, SWOT tool itself approximates authentication schemes but in the discussion chapter we illustrated clearly what is necessary to adopt individually between Non SIM and SIM base authentication schemes. It will help network operators to choose the most appropriate authentication technology/technologies for design and implementation.
SWOT analysis is performed on IMS security authentication schemes to demonstrate the effectiveness of each schemes in terms of multiple parameters and associated dependencies for users and network operators. Due to SWOT tool we have been able to describe strengths, weakness, opportunities and threats in each authentication scheme separately. The analysis performed mostly based on the state of art studies, SWOT tool itself approximates authentication schemes but in the discussion chapter we illustrated clearly what is necessary to adopt individually between Non SIM and SIM base authentication schemes. It will help network operators to choose the most appropriate authentication technology/technologies for design and implementation.