Internet Protocol Multimedia Subsystem, better known as IMS, is based on SIP protocol, and can provide voice, video, text and other multimedia applications of next generation network convergence. IMS for its excellent open and fully distributed architecture, so that applications, control and bearer are separated and the industry has been recognized as the direction of the evolution of next generation networks. The various standards organizations also are conducting with IMS as the core of the next generation network research.However, for such a SIP-based all-IP architecture, there are many flaws and loopholes, it is vulnerable to attack, another, IMS access independence, allows the user through a variety of flexible and diversified intelligent terminal access IMS, makes the IMS network safe. Only developed a good network security solutions to address the IMS network security, access security, in order to ensure the reliable deployment of IMS networks, and thus toward business.This paper is on this background, analysing the access security solution of IMS Network. Firstly, it introduces the environment of IMS origin; the IMS based NGN, the secure problem IMS may meet IMS security architecture and secure mechaniSgwSip. Then, it discusses the security solution for UMTS access and WLAN access. It analyses the AKA authentiratinn progress and the SA build procedure between the UE and P-CSCF and bring forward an easy deployment security solution. And then, introduced the application scenario of Session Border Controller in IMS architecture and their typical functions, such as NAT, topology hiding, interconnecting at different IP abilities, and research how to SIPParserlement these functions. |