Font Size: a A A

Research And Implementation Of IMS Network Security Access Solution

Posted on:2010-04-15Degree:MasterType:Thesis
Country:ChinaCandidate:X Y WuFull Text:PDF
GTID:2218360305498706Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Internet Protocol Multimedia Subsystem, better known as IMS, is based on SIP protocol, and can provide voice, video, text and other multimedia applications of next generation network convergence. IMS for its excellent open and fully distributed architecture, so that applications, control and bearer are separated and the industry has been recognized as the direction of the evolution of next generation networks. The various standards organizations also are conducting with IMS as the core of the next generation network research.However, for such a SIP-based all-IP architecture, there are many flaws and loopholes, it is vulnerable to attack, another, IMS access independence, allows the user through a variety of flexible and diversified intelligent terminal access IMS, makes the IMS network safe. Only developed a good network security solutions to address the IMS network security, access security, in order to ensure the reliable deployment of IMS networks, and thus toward business.This paper is on this background, analysing the access security solution of IMS Network. Firstly, it introduces the environment of IMS origin; the IMS based NGN, the secure problem IMS may meet IMS security architecture and secure mechaniSgwSip. Then, it discusses the security solution for UMTS access and WLAN access. It analyses the AKA authentiratinn progress and the SA build procedure between the UE and P-CSCF and bring forward an easy deployment security solution. And then, introduced the application scenario of Session Border Controller in IMS architecture and their typical functions, such as NAT, topology hiding, interconnecting at different IP abilities, and research how to SIPParserlement these functions.
Keywords/Search Tags:IMS, Access, Security, SBC
PDF Full Text Request
Related items