当前位置:网站首页>Application of Identification Cryptography in IMS Network
Application of Identification Cryptography in IMS Network
2022-08-11 04:42:00 【Robert's Tech House】
Summary
As a unified core network architecture platform for fixed network and mobile in the future, the security problem of IP Multimedia Subsystem (IMS) cannot be ignored.The identification cryptography technology is based on the bilinear paired identification cryptographic algorithm, uses the user identity as the public key, realizes the natural binding of the user identity and the public key, and builds a relatively simplified and low-complexity public key cryptography system.etc. have natural advantages.Through the research on the distributed identification and password mechanism, based on the IMS network, the security distribution of private keys, terminal network authentication, service key negotiation and other workflows are designed to effectively solve the security protection problem of the IMS network. Finally, the security of the scheme is evaluated and analyzed..
Content Directory:
1 Identification and password technology
2 Application deployment of ID password in IMS network
2.1 Deployment Scheme
2.2 Process design based on identification password
2.2.1 Secure distribution of private keys
2.2.2 Terminal network access authentication
2.2.3 Service Key Negotiation
2.3 Security Analysis
3 Conclusion
IP Multimedia Subsystem (IMS) is a set of frameworks proposed by the 3rd Generation Partnership Project (3GPP) to support IP multimedia services. It is based on the Session Initiation Protocol (SIP)) to complete the call control function and realize the creation, management and termination of multimedia services.IMS realizes the integration of multiple services through the IP bearer network, forming a new-generation softswitch platform that separates control and bearer, and separates service and control.The choice of IMS as the unified core network architecture for fixed and mobile networks has been the consensus of major standards organizations in the field of mobile communications at home and abroad.However, due to I
边栏推荐
猜你喜欢

Where can machine learning be applied?What is machine learning useful for?

Provincial level of Echart maps, as well as all prefecture-level download and use

网络安全培训机构哪家好?排名怎么选择?

Dry goods: The principle and practice of server network card group technology

Use jackson to parse json data in detail

To break the bottleneck of transactional work, the gentleman signs the electronic contract to release the "source power" of HR!

es-head plugin insert query and conditional query (5)

ALSA音频架构 -- snd_pcm_open函数分析

"125 Palindrome Verification" of the 10th day string series of LeetCode brushing questions

对象的创建以及显示转换
随机推荐
Solve the problem of multi-thread calling sql stored procedure
Read the article, high-performance and predictable data center network
findViewById返回null的问题
WPF DataGrid 使用数据模板(2)
Add PRODUCT_BOOT_JARS and classes to provide jar packages to applications
【深度学习】基于卷积神经网络的天气识别训练
JwsManager service interface implementation class - the jni implementation
.NET 服务注册
I wrote some code in my resume, but I still can't pass the interview
C# 一周入门高级编程之《C#-LINQ》Day Four
map and set - natural search and lookup semantics
[Likou] 22. Bracket generation
二叉堆的基础~
[Server installation Redis] Centos7 offline installation of redis
使用百度EasyDL实现施工人员安全装备检测
LeetCode814 Math Question Day 15 Binary Tree Series Value "814 Binary Tree Pruning"
LeetCode刷题第12天二叉树系列之《104 二叉树的最大深度》
这些云自动化测试工具值得拥有
关于pom.xml文件
力扣——青蛙跳台阶问题