Font Size: a A A

Research And Realization Of End-to-End Security Mechanism In IMS

Posted on:2011-06-03Degree:MasterType:Thesis
Country:ChinaCandidate:F Q XuFull Text:PDF
GTID:2178360305487704Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
IMS (IP Multimedia Subsystem) is the subsystem submitted by the 3GPP standards organization in the R5 version in order to support IP multimedia services. The subsystem superimposed on the Packet Switched (PS) network is a part of 3G core network. IMS is a all IP architecture based on Session Initiation Protocol (SIP), and due to various loopholes of IP protocol IMS network is not very secure and vulnerable to be attacked by the outside. This paper deeply analyzed and compared with IPsec security mechanisms and TLS security mechanisms used in the current IMS network from the perspective of the security of media layer. This paper derived a end-to-end security mechanism of the key agreement between domains for the IMS network by improving the four-party password-based authentication and key agreement protocol, and carried out its security analysis. finally simulation results validated the safety and feasibility of the end-to-end key agreement protocol.
Keywords/Search Tags:IMS, IPsec, TLS, Media layer security, Authentication and key agreement protocol
PDF Full Text Request
Related items