Description
The IMS Subscriber Identity Module (ISIM) is a specialized software application residing on a Universal Integrated Circuit Card (UICC), commonly known as a SIM card. It is distinct from the classic SIM application used for cellular network access (CS domain) and the USIM application for 3G/4G packet access (PS domain). The ISIM application is dedicated exclusively to the IP Multimedia Subsystem (IMS), which provides multimedia services like Voice over LTE (VoLTE), video calls, and instant messaging over the mobile packet core.
Architecturally, the ISIM contains a set of securely stored files and parameters essential for IMS registration and service invocation. The most critical data is the IMS Private User Identity (IMPI), a unique global identifier for the subscriber in the IMS realm (often formatted like a NAI, e.g., [email protected]). It also stores the corresponding IMS Public User Identity (IMPU), which is the address used for communication (e.g., a SIP URI). Furthermore, the ISIM holds long-term authentication credentials: a shared secret key and the associated authentication algorithm parameters. These credentials are used in the IMS Authentication and Key Agreement (IMS AKA) procedure.
When a user wishes to access IMS services, the mobile device's IMS client reads the necessary identities from the ISIM. During registration, the device and the network perform the IMS AKA protocol. The device uses the secret key from the ISIM to compute a response to a challenge from the network. This process authenticates the subscriber to the IMS network and establishes secure session keys for protecting SIP signaling. The ISIM thus acts as the root-of-trust for IMS access, analogous to how USIM authenticates the user to the packet core network.
The ISIM application interoperates with other applications on the same UICC. A device may use the USIM for accessing the LTE/5G network (for bearer connectivity) and the ISIM simultaneously for accessing IMS services over that bearer. This separation allows for independent management of credentials and services. The ISIM's role is foundational for IMS security and service portability, as the subscriber's IMS identity and credentials are physically stored on a portable, tamper-resistant card.
Purpose & Motivation
The ISIM was created to provide a secure, portable, and standardized identity module specifically for the IMS, which is a service architecture separate from the traditional cellular access networks. Before ISIM, early IMS implementations often used soft credentials (username/password stored in the device) or attempted to derive IMS identities from cellular identities (like IMSI). These approaches had security weaknesses (soft credentials are vulnerable) or limitations in flexibility (tight coupling to cellular subscription).
A dedicated module was necessary because IMS authentication (IMS AKA) is different from the cellular network authentication (used by SIM/USIM). IMS uses SIP-based protocols and requires identities formatted as URIs or NAIs, not MSISDN or IMSI. The ISIM provides a secure hardware container for these new identity formats and the associated cryptographic keys, ensuring a high level of security equivalent to that of cellular access. It also enables service portability; a user can move their UICC to a new device and immediately have their IMS identity and services available.
Its introduction in Release 5 coincided with the initial standardization of IMS. It solved the problem of how to securely and manageably provision IMS subscriptions to end-users. By leveraging the existing UICC platform, it allowed operators to offer IMS services using a familiar, secure distribution mechanism (the SIM card). The ISIM established a clear separation of credentials, allowing a user to have independent subscriptions for cellular access and IMS services, even if provided by the same operator.
Key Features
- Stores the IMS Private User Identity (IMPI) and Public User Identity (IMPU)
- Contains long-term secret key for IMS Authentication and Key Agreement (IMS AKA)
- Implemented as a dedicated application on a UICC (smart card)
- Provides hardware-based security for IMS credentials, resistant to tampering
- Enables secure IMS registration and service access (e.g., VoLTE)
- Operates independently from USIM/SIM applications on the same UICC
Evolution Across Releases
The ISIM application was initially standardized as part of the first mature IMS specifications. It defined the file structure on the UICC to store IMS identities (IMPI, IMPU) and authentication credentials, establishing the secure foundation for subscriber access to IMS services like voice and video over IP.
Defining Specifications
| Specification | Title |
|---|---|
| TS 21.905 | 3GPP TS 21.905 |
| TS 22.944 | 3GPP TS 22.944 |
| TS 22.980 | 3GPP TS 22.980 |
| TS 23.228 | 3GPP TS 23.228 |
| TS 23.700 | 3GPP TS 23.700 |
| TS 24.167 | 3GPP TS 24.167 |
| TS 24.186 | 3GPP TS 24.186 |
| TS 24.229 | 3GPP TS 24.229 |
| TS 31.103 | 3GPP TR 31.103 |
| TS 31.829 | 3GPP TR 31.829 |
| TS 31.901 | 3GPP TR 31.901 |
| TS 32.181 | 3GPP TR 32.181 |
| TS 32.182 | 3GPP TR 32.182 |
| TS 32.808 | 3GPP TR 32.808 |
| TS 33.141 | 3GPP TR 33.141 |
| TS 33.203 | 3GPP TR 33.203 |
| TS 33.812 | 3GPP TR 33.812 |
| TS 33.978 | 3GPP TR 33.978 |