Font Size: a A A

Research On IMS Security And Traversal Of NAT

Posted on:2007-10-06Degree:MasterType:Thesis
Country:ChinaCandidate:X D ZhaoFull Text:PDF
GTID:2178360185467843Subject:Information security
Abstract/Summary:PDF Full Text Request
With the continuous prosperity of communication industry, the third generation mobile communication not only satisfies with the voice and simple data services, but also wants to introduce an ALL-IP core network to provide the rich and colorful services just like Internet. Currently, SIP was introduced to support multimedia applications and services for carrier in the IP multimedia subsystem of 3G But as the Internet born to be an unsecured network, the 3G mobile communication will meet the same challenge with the IP core network. And how to resolve these security issues will be a great problem.So the paper focus on the security about IMS(IP Multimedia Subsystem),especially on the collaboration with IPSec because the 3GPP has picked up the IPSec as the basement of security of IMS.In this days,the deployment of NAT has already been used broadly around the whole Internet,and which leads to a question how to make it available on the IMS for its role on the network.The paper is mainly focusing on how to solve the problem,and since the SIP is working on the IMS as the signaling,and the paper has provide a solution to implement SIPNAT traversal.Following are the main works researched in this paper.1. Research on the deployment of IMSOutlines the deployment of SIP protocols in IP Multimedia Subsystem, analyses the security mechanisms of the IMS form the access authentication to the core network.Especially the research on the procedure of the establishment of SA through the AKA process is on the progress.2. Put forword an implementation of SIP's traversal of NAT Analyse some available solutions of SIP's traversal of NAT,such asALG,Proxy,MIDCOM,STUN,TURN,UPnP and compare them in order to list their advantages and disadvantages respectively.Finally the paper discuss the whole implementation through ICE(Interactive Connectivity...
Keywords/Search Tags:IMS Security, SIP, IPSec, NAT Traversal, ICE, SA
PDF Full Text Request
Related items