Font Size: a A A

Research On Authentication Framework Of IMS Core Network

Posted on:2009-08-23Degree:MasterType:Thesis
Country:ChinaCandidate:P C LiFull Text:PDF
GTID:2178360245470046Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
IMS, i.e. IP Multimedia Subsystem, is a kind of state of art Multimedia business. It can satisfy the novelty and diversification of the multimedia business products. Although IMS has not been widely deployed in commercial scenario, some of the most famous Telecommunication equipment providers have released their newly developed IMS-based Product. Some operators are undertaking their test network plan using IMS techniques. During the process of network evolution and convergence, the security aspect of IMS is especially important. This topic divides IMS into 3 layers, which are access level, core node level and business level, which compromise the 3 IMS core network Authentication framework. This framework is based on the research on the standard and draft of 3GPP, TISPAN, ITU-T and IETF, I paid attention to the description of client access authentication, core nodes authentication and the integrated IMS architecture Trustworthy solution after the detail analysis of the protocol, architectures and services of NGN and IMS techniques. Aiming at the multiple and open IMS services, I present a full service authentication architecture with 3GPP/3GPP2 GAA as reference.Among the authentication technologies, access authentications are described both as mobile access and fixed network access. Core network analysis includes mutual authentication between P-CSCF and S-CSCF, and trusted IMS as well. Business authentication includes the bootstrapping authentication framework of fixed network access to IMS.
Keywords/Search Tags:IP Multimedia Subsystem, Authentication, Trust compute, Authentication and Key Agreement
PDF Full Text Request
Related items