当前位置:网站首页>Application of Identification Cryptography in IMS Network
Application of Identification Cryptography in IMS Network
2022-08-11 04:42:00 【Robert's Tech House】
Summary
As a unified core network architecture platform for fixed network and mobile in the future, the security problem of IP Multimedia Subsystem (IMS) cannot be ignored.The identification cryptography technology is based on the bilinear paired identification cryptographic algorithm, uses the user identity as the public key, realizes the natural binding of the user identity and the public key, and builds a relatively simplified and low-complexity public key cryptography system.etc. have natural advantages.Through the research on the distributed identification and password mechanism, based on the IMS network, the security distribution of private keys, terminal network authentication, service key negotiation and other workflows are designed to effectively solve the security protection problem of the IMS network. Finally, the security of the scheme is evaluated and analyzed..
Content Directory:
1 Identification and password technology
2 Application deployment of ID password in IMS network
2.1 Deployment Scheme
2.2 Process design based on identification password
2.2.1 Secure distribution of private keys
2.2.2 Terminal network access authentication
2.2.3 Service Key Negotiation
2.3 Security Analysis
3 Conclusion
IP Multimedia Subsystem (IMS) is a set of frameworks proposed by the 3rd Generation Partnership Project (3GPP) to support IP multimedia services. It is based on the Session Initiation Protocol (SIP)) to complete the call control function and realize the creation, management and termination of multimedia services.IMS realizes the integration of multiple services through the IP bearer network, forming a new-generation softswitch platform that separates control and bearer, and separates service and control.The choice of IMS as the unified core network architecture for fixed and mobile networks has been the consensus of major standards organizations in the field of mobile communications at home and abroad.However, due to I
边栏推荐
- vector中resize() 用法排坑
- Object Creation and Display Transformation
- 拼多多店铺营业执照相关问题
- Listen to pull out U disk inserted into the message, U disk drive
- Mysql中事件和定时任务
- The custom of the C language types -- -- -- -- -- - structure
- Use jackson to parse json data in detail
- 【ImageNet】数据集1000个类的名称
- Solve the problem of multi-thread calling sql stored procedure
- "110 Balanced Binary Tree Judgment" in leetCode's 14-day binary tree series
猜你喜欢

"3 Longest Substring Without Repeating Characters" on the 17th day of LeetCode brushing

嵌入式分享合集33

北湖区燕泉街道开展“戴头盔·保安全”送头盔活动

Apache初体验

CAD2020 打开错误报告 e06d7363h Exception at 13644F69h

Where can machine learning be applied?What is machine learning useful for?

延长经济保险(jeecgboot)

分层架构&SOA架构

LeetCode814 Math Question Day 15 Binary Tree Series Value "814 Binary Tree Pruning"

Three 】 【 yolov7 series of actual combat from 0 to build training data sets
随机推荐
利用Navicat Premium导出数据库表结构信息至Excel
如何将360全景图导出高清短视频分享到视频平台上?
Which one to choose for mobile map development?
Snap - rotate the smallest number of an array
[Actual combat scene] Mall-discount event design plan
【组成原理 九 CPU】
.NET service registration
Word2021 中的图片保存后就变模糊了
send_sig: 内核执行流程
To break the bottleneck of transactional work, the gentleman signs the electronic contract to release the "source power" of HR!
洛谷P7441 Erinnerung
洛谷P2580 于是他错误的点名开始了
《卫星界》刊评“星辰大海”计划:孙宇晨为太空旅游带来新的机遇
How to add icons to web pages?
这些云自动化测试工具值得拥有
拼多多店铺营业执照相关问题
如何进行AI业务诊断,快速识别降本提效增长点?
map和set--天然的搜索和查找语义
视觉任务种常用的类别文件之一json文件
2022新员工公司级安全教育基础培训(118页)