12

Security for Voice over LTE

Voice has historically been the first application of mobile communication networks, and the success of GSM has been primarily based on voice. While it is true that data applications have considerably gained in importance over the years, voice is still a major source of revenue for mobile operators. It is expected that voice will remain an important application even in the era of LTE, so there has been a lot of discussion about the best way to provide voice in an LTE environment. Owing to this importance, we include this chapter on security of voice over LTE in this book although, as we will show in the following, the corresponding security mechanisms are largely orthogonal to the LTE security mechanisms discussed in the rest of the book.

The nature of this chapter is therefore somewhat different from the rest of the book in that it describes all the relevant mechanisms, but does not go to a similar level of detail. It includes the necessary references for readers who want to delve into this subject more deeply.

In section 12.1 we briefly introduce the methods standardized by 3GPP for providing voice over LTE. Then in section 12.2 we discuss the security mechanisms used with these methods.

12.1 Methods for Providing Voice over LTE

There are two standardized methods for providing voice over LTE:

  • IMS over LTE. IMS is a largely access-independent service control architecture that enables various types of multimedia services using IP connectivity.

Get LTE Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.