IMPI (IP multimedia private identity)
Introduction:
IP Multimedia Private Identity (IMPI) is a unique identity used in IP Multimedia Subsystem (IMS) architecture, which is an open standard, next-generation IP-based communication framework. It enables multimedia services such as voice, video, and messaging over IP networks, including the internet. The IMS architecture supports the seamless integration of various communication networks, such as 2G, 3G, 4G, Wi-Fi, and fixed-line networks. In this article, we will discuss the IMPI and its role in the IMS architecture in detail.
What is IMPI?
IMPI is a unique identity used in IMS architecture to identify a user or a device. It is used to authenticate the user/device and authorize the access to the IMS network. The IMPI is similar to the User Identity Module (UIM) used in cellular networks, which stores the subscriber's identity and authentication information. The IMPI is assigned by the IMS network operator, and it is stored in the user's or device's equipment.
The IMPI is a hierarchical identity structure that consists of three parts: the domain name, the user name, and the network access identifier (NAI). The domain name is the unique identifier of the IMS network operator. The user name is the unique identifier of the user or device within the IMS network. The NAI is the identifier of the access network, such as the Wi-Fi network or the cellular network. The IMPI is globally unique, and it is used for authentication and authorization purposes in the IMS network.
IMPI Authentication:
The IMPI is used for authentication purposes in the IMS network. When a user or device initiates a session in the IMS network, the IMPI is used to authenticate the user or device. The authentication process involves the following steps:
- The user/device sends an authentication request to the IMS network.
- The IMS network sends an authentication challenge to the user/device.
- The user/device sends an authentication response to the IMS network, which includes the IMPI and the authentication key.
- The IMS network verifies the authentication response by checking the IMPI and the authentication key.
- If the authentication is successful, the user/device is authorized to access the IMS network.
IMPI Authorization:
The IMPI is also used for authorization purposes in the IMS network. The authorization process involves the following steps:
- The user/device sends a request to access a particular service in the IMS network.
- The IMS network checks the IMPI to verify the identity of the user/device.
- The IMS network checks the user's/device's authorization information to determine whether the user/device is authorized to access the requested service.
- If the user/device is authorized to access the service, the IMS network grants access to the service.
IMPI in IMS Architecture:
The IMS architecture is based on the Session Initiation Protocol (SIP), which is a signaling protocol used for establishing, modifying, and terminating multimedia sessions over IP networks. The IMS architecture consists of various network elements, such as the Call Session Control Function (CSCF), the Home Subscriber Server (HSS), and the Media Gateway Control Function (MGCF).
The CSCF is the main signaling entity in the IMS architecture. It receives the SIP messages from the user or device and processes them to establish the session. The CSCF includes three functional entities: the Proxy-CSCF (P-CSCF), the Serving-CSCF (S-CSCF), and the Interrogating-CSCF (I-CSCF). The P-CSCF is the first point of contact for the user/device, and it forwards the SIP messages to the S-CSCF. The S-CSCF is responsible for authenticating and authorizing the user/device and determining the appropriate service logic. The HSS is a central database that stores the user's or device's subscription and authentication information. It includes the IMPI, the International Mobile Subscriber Identity (IMSI), the Authentication and Key Agreement (AKA) parameters, and the user's profile. The HSS communicates with the CSCF to provide the user's or device's authentication and authorization information.
The MGCF is responsible for translating the SIP messages between the IMS network and the Public Switched Telephone Network (PSTN). It includes the Media Gateway (MGW), which converts the media streams between the IP network and the PSTN.
The IMPI plays a critical role in the IMS architecture. It is used to identify and authenticate the user/device and authorize access to the IMS network. The IMPI is stored in the HSS, and it is used by the CSCF for authentication and authorization purposes. The IMPI is also used by the user/device to initiate sessions and access services in the IMS network.
IMPI and Security:
The IMPI is a critical component of the IMS security architecture. It is used to authenticate and authorize the user/device, which ensures the integrity and confidentiality of the communication. The IMS security architecture includes various security mechanisms, such as encryption, authentication, and access control.
The IMS security architecture uses the AKA mechanism to authenticate the user/device. The AKA mechanism uses the IMPI, the IMSI, and the AKA parameters to generate a session key, which is used to encrypt the communication between the user/device and the IMS network. The AKA mechanism provides mutual authentication, which ensures that both the user/device and the IMS network are authenticated.
The IMS security architecture also includes access control mechanisms, which ensure that only authorized users/devices can access the IMS network. The access control mechanisms use the IMPI to determine the user's or device's authorization information, such as the subscription type, the service plan, and the access rights.
Conclusion:
In conclusion, the IMPI is a critical component of the IMS architecture. It is used to identify and authenticate the user/device and authorize access to the IMS network. The IMPI is stored in the user's or device's equipment and the HSS, and it is used by the CSCF for authentication and authorization purposes. The IMPI plays a crucial role in ensuring the security and integrity of the communication in the IMS network.