Netinfo Security ›› 2021, Vol. 21 ›› Issue (1): 88-96.doi: 10.3969/j.issn.1671-1122.2021.01.011

Previous Articles    

Research on Authentication and Key Agreement Method of IMS-based Mobile Communication Private Network

DONG Qiang1, LUO Guoming1, SHI Hongkui2, ZHANG Yongyue3()   

  1. 1. Institute of Communication Engineering, Army Engineering University of PLA, Nanjing 210042, China
    2. Nanjing University of Posts and Telecommunications, Nanjing 210023, China
    3. Tianjin Municipal Big Data Administration Center, Tianjin 300221, China
  • Received:2020-11-20 Online:2021-01-10 Published:2021-02-23
  • Contact: ZHANG Yongyue E-mail:zyy_xp@126.com

Abstract:

In order to adapt to the development of the industry's mobile communication private network and the demand for confidential call services, in view of the independent service control characteristics of the private network, a forward compatible private network functional structure model is proposed in the mobile communication private network using IMS technology architecture, focusing on research and analysis of several authentication and key agreement schemes which can be applied to IMS private network. According to whether the home server participates in the authentication process, this article is divided into two types of application scenarios, end-to-end and end-to-server, and comprehensively compares the security performance and computing overhead of various authentication and key agreement schemes, and gives a better scheme, which is a private network provide reference for the construction of communication security related mechanisms.

Key words: SIP, private network security, authentication, key agreement

CLC Number: