Because of the flexibility and expansibility of protocol on IMS network, it brings a fresh new power to the modern communication technology and makes the the services of communication system more and more varied. But because of the openness of IMS, it brings many new threats to communicates network. And the existing security authentication technologies of IMS are not safe enough or their cost is too high.In this thesis, the technologies of IMS network security authentication were analyzed, a multi-PKG cipher algorithm and an improved security authentication scheme of IMS network by using this algorithm were designed to meet the needs of security and real-time for IMS. The scheme protected the confidentiality and integrity of datas between UE and IMS network. The main research contents in this thesis are as follow:(l)The IMS network architecture and the SIP protocol were studied. The exsiting security threatens IMS faced and the existing security authentication technologies on IMS were analyzed.(2)An algorithm named Multi-PKG Identity Based Encryption was designed to slove the problem of too high authority of PKG. In this algorithm, the privacy key of users is produced by multiple PKGs, not a single PKG. The algorithm is simple and high efficiency to meet the needs of security and real-time for IMS. The algorithm realized the authentication of both sides and the key agreement between UE and IMS, and solves the problem of too high authority of PKG.(3)Then, a security authentication scheme based on the Multi-PKG IBE algorithm was designed. In this scheme, the network deployment and the system architecture were designed. Then the process of how to apply the algoritm on IMS network was described to protect the confidentiality and integrity of communications between UE and IMS network.Finally, the security, the efficiency of algorithm and the implementation costs of this authenticate scheme were analyzed. And then, it was proved through experiments by using the SIP protocol stack OSIP and OPENIMSCORE. This result proved that the scheme can effectively protect the users’ communication data between UE and IMS network. |