| IP Multiple Subsystem (IMS) is introduced by 3GPP Release 5. Its core characteristic is using SIP protocol. IMS makes it possible to type access device and provides convenient and varied services for users. IMS leads the telecommunication to a new era and is the development trend for the core network communication.User equipment can be registered on IMS is the precondition it can get the services by IMS core network. Different authentication schemes will leads to different registration call flows. So the research of authentication schemes is important for the user equipment's registration. Now there are some research conclusions about this, but there is still no detailed research about invalid authentication. Such as whether some wrong messages can be identified, there are no much more conclusions. This thesis is aimed at researching on the authentication schemes about user equipment and IMS core network. Through simulation results about successful and invalid registration, conclusions can be summarized.Based on the above analysis, the authentication schemes about IMS users have been analyzed. The simulation part of this thesis is based on the OSIMS (Open Source IMS) platform. The main contents are as follows:1. Research the architecture of IMS network, the entities and interfaces of them in details. In addition, several protocols of IMS have been analyzed.2. Detailed analysis of SIP protocol and authentication schemes of IMS users. Here is some contrastive analysis about HTTP Digest, AKA, SIP Digest, and so on. There is not only the analysis of principle of the authentication schemes, but also the detailed analysis of the processes for IMS users'registration.3. Based on the platform of OSIMS (Open Source IMS), the research results of valid authentication schemes have been verified through doing analysis of the simulation data. What is more, several invalid authentication schemes: invalid Public Identity, invalid password, invalid domain name have been tried. Finally, conclusive analysis has been listed in the thesis.In the end of this thesis, the summarization has been written. What is more, the shorcomings of this paper is listed. And finally, the direction of the next work is defined. |