信息网络安全 ›› 2021, Vol. 21 ›› Issue (1): 88-96.doi: 10.3969/j.issn.1671-1122.2021.01.011

• 理论研究 • 上一篇    

基于IMS的移动通信专网认证和密钥协商方法研究

董锵1, 罗国明1, 史宏逵2, 张永跃3()   

  1. 1.中国人民解放军陆军工程大学通信工程学院,南京 210042
    2.南京邮电大学,南京 210023
    3.天津市大数据管理中心,天津 300221
  • 收稿日期:2020-11-20 出版日期:2021-01-10 发布日期:2021-02-23
  • 通讯作者: 张永跃 E-mail:zyy_xp@126.com
  • 作者简介:董锵(1989—),男,湖北,硕士研究生,主要研究方向为移动通信网络|罗国明(1965—),男,重庆,教授,本科,主要研究方向为信息与通信网、通信网规划与设计|史宏逵(1973—),男,浙江,副研究员,博士,主要研究方向为下一代移动通信技术|张永跃(1981—),男,天津,工程师,本科, 主要研究方向为电子政务、数据资源共享开放、电子认证、数据安全。
  • 基金资助:
    国家自然科学基金(61871399)

Research on Authentication and Key Agreement Method of IMS-based Mobile Communication Private Network

DONG Qiang1, LUO Guoming1, SHI Hongkui2, ZHANG Yongyue3()   

  1. 1. Institute of Communication Engineering, Army Engineering University of PLA, Nanjing 210042, China
    2. Nanjing University of Posts and Telecommunications, Nanjing 210023, China
    3. Tianjin Municipal Big Data Administration Center, Tianjin 300221, China
  • Received:2020-11-20 Online:2021-01-10 Published:2021-02-23
  • Contact: ZHANG Yongyue E-mail:zyy_xp@126.com

摘要:

为适应行业移动通信专网发展和保密通话业务需求,文章针对专网独立业务控制特点,在应用IMS技术架构的移动通信专网中,提出一种向前兼容的专网功能结构模型。文章研究分析了多个可应用于IMS专网的认证和密钥协商方案,并根据归属地服务器是否参与认证过程,分端到端、端到服务器两类应用场景,综合比较各类认证和密钥协商方案的安全性能和运算开销,最后给出较优方案,为专网通信安全相关机制建设提供参考。

关键词: 会话初始化协议, 专网安全, 认证, 密钥协商

Abstract:

In order to adapt to the development of the industry's mobile communication private network and the demand for confidential call services, in view of the independent service control characteristics of the private network, a forward compatible private network functional structure model is proposed in the mobile communication private network using IMS technology architecture, focusing on research and analysis of several authentication and key agreement schemes which can be applied to IMS private network. According to whether the home server participates in the authentication process, this article is divided into two types of application scenarios, end-to-end and end-to-server, and comprehensively compares the security performance and computing overhead of various authentication and key agreement schemes, and gives a better scheme, which is a private network provide reference for the construction of communication security related mechanisms.

Key words: SIP, private network security, authentication, key agreement

中图分类号: