当前位置:网站首页>Application of Identification Cryptography in IMS Network
Application of Identification Cryptography in IMS Network
2022-08-11 04:42:00 【Robert's Tech House】
Summary
As a unified core network architecture platform for fixed network and mobile in the future, the security problem of IP Multimedia Subsystem (IMS) cannot be ignored.The identification cryptography technology is based on the bilinear paired identification cryptographic algorithm, uses the user identity as the public key, realizes the natural binding of the user identity and the public key, and builds a relatively simplified and low-complexity public key cryptography system.etc. have natural advantages.Through the research on the distributed identification and password mechanism, based on the IMS network, the security distribution of private keys, terminal network authentication, service key negotiation and other workflows are designed to effectively solve the security protection problem of the IMS network. Finally, the security of the scheme is evaluated and analyzed..
Content Directory:
1 Identification and password technology
2 Application deployment of ID password in IMS network
2.1 Deployment Scheme
2.2 Process design based on identification password
2.2.1 Secure distribution of private keys
2.2.2 Terminal network access authentication
2.2.3 Service Key Negotiation
2.3 Security Analysis
3 Conclusion
IP Multimedia Subsystem (IMS) is a set of frameworks proposed by the 3rd Generation Partnership Project (3GPP) to support IP multimedia services. It is based on the Session Initiation Protocol (SIP)) to complete the call control function and realize the creation, management and termination of multimedia services.IMS realizes the integration of multiple services through the IP bearer network, forming a new-generation softswitch platform that separates control and bearer, and separates service and control.The choice of IMS as the unified core network architecture for fixed and mobile networks has been the consensus of major standards organizations in the field of mobile communications at home and abroad.However, due to I
边栏推荐
猜你喜欢
Provincial level of Echart maps, as well as all prefecture-level download and use
【FPGA】abbreviation
这些云自动化测试工具值得拥有
LeetCode刷题第11天字符串系列之《 58最后一个单词长度》
洛谷P2150 寿司晚宴
0基础转行软件测试,自学3个月,浅拿12k*13薪offer
无线电射频能量的收集
Jetson Orin platform 4-16 channel GMSL2/GSML1 camera acquisition kit recommended
Self-research capability was recognized again, and Tencent Cloud Database was included in the Forrester Translytical report
ALSA音频架构
随机推荐
[Web3 series development tutorial - create your first NFT (9)] How to view your NFT in the mobile wallet
Overview of the JVM garbage collection and mechanism
华南师范宋宇老师课堂对话论文翻译
洛谷P4560 Wall 砖墙
【人话版】WEB3将至之“权益的游戏”
《卫星界》刊评“星辰大海”计划:孙宇晨为太空旅游带来新的机遇
使用百度EasyDL实现施工人员安全装备检测
简历里写了会代码,却依然过不了面试这一关
The priority queue
"104 Maximum Depth of Binary Trees" in LeetCode's Day 12 Binary Tree Series
洛谷P6586 蒟蒻火锅的盛宴
LeetCode Brush Questions Day 11 String Series "58 Last Word Length"
使用百度EasyDL实现森林火灾预警识别
增加PRODUCT_BOOT_JARS及类 提供jar包给应用
shell monitors gpu usage
Dry goods: The principle and practice of server network card group technology
Object Creation and Display Transformation
JwsManager service interface implementation class - the jni implementation
Three 】 【 yolov7 series of actual combat from 0 to build training data sets
[Server installation Redis] Centos7 offline installation of redis