Font Size: a A A

The Implementation And Security Mechamism Research Of Volte Based On4G Lte Core Network Epc&Ims

Posted on:2015-06-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y HuangFull Text:PDF
GTID:2298330467454910Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
As VoLTE (Voice Over LTE)provides the voice service at4G age which is based upon the voice communication.Its core network has completely abandoned CS domain,only PS domain was kept.AH the data、voices are managed by PS domain.To compare the traditional2G/3G technologies, VoLTE is not only limited to carry out the high quality of multimedia communication,but also to achieve accomplishment of other services such as voice call management,provding flexible and reasonable charge services.It will definitely be the first choice for end users in the further.However, because the VoLTE based upon a kind of exoteric network structure.It utilized fully IP network upon the SIP protocol,all the voice calls are carried out via PS domain rather than CS domain,thus this characteristic made VoLTE face a lot of security issues.Especially for2issues we have to point out; First is that authentication between user equipment and business network.Second one is the voice data security between two end user.Upon this characteristic,this Dissertation will be getting start from the standard SIP protocol.At the first stage,we would like to briefly introduce the basic principle of VoLTE. Secondly, the specific workflow of VoLTE connectivity(including EPC attachment,the creation of bear,How does UE connect to IMS via IP), the introduction of VoLTE business case would be discussed then,whilst it would include the process on how does user equipment switch from non-IMS covered area to2G/3G in order to complete the uninterrupted voice call.To evaluate and analyse the VoLTE over the weakness in VoLTE.The analysis of security vulnerabilities that possibly will impact to VoLTE.Subsequently utilizing a sort of solutions,including authroziation of User equipment,creation of SA,encryption of voice data. To explain how does the different of IPsec algorithm work within VoLTE.To discover the advantage and disadvantage of these algorithms by comparation and research among them. Ultimately, we will be able to develop a best solution which makes combination of all advantages from these algorithms for the enhancement of availability,confidentiality,integrality for VoLTE.
Keywords/Search Tags:VoLTE, IPsec, IMS, 3DES, AES, ECC, Mixed encryption
PDF Full Text Request
Related items