基于ECC的IMS AKA鉴权机制研究  被引量:2

IMS AKA Authentication Mechanism based on ECC

在线阅读下载全文

作  者:张鹤鸣 鲁绍栋 廖蓉晖[1] ZHANG He-ming;LU Shao-dong;LIAO Rong-hui(No.30 Institute of CETC,Chengdu Sichuan 610041,China)

机构地区:[1]中国电子科技集团公司第三十研究所,四川成都610041

出  处:《通信技术》2018年第8期1945-1948,共4页Communications Technology

摘  要:作为新一代的软交换平台,IMS的安全性问题不容忽视。认证鉴权作为用户接入安全的重要环节,是控制用户访问核心网络、提升系统安全的关键手段。其中,具备双向认证的AKA机制,以安全强度高、对接入网络无需求等特点被广泛认可。但在实际应用过程中,该机制依然存在一些安全问题,如注册消息存在被篡改的风险、用户认证数据可能被攻击者窃取等。通过对IMS AKA机制的安全漏洞进行分析,基于ECC算法原理提出了改进型AKA鉴权机制,并对该机制应用于IMS网络的安全性进行了评估分析。As a new-generation soft-switch platform, IMS security cannot be ignored. Authentication, an important link of user access security, is a key means to control users' access to the core network and improve system security. Among them, the AKA mechanism with two-way authentication is widely recognized for its high security strength and no requirement of access to the network. However, in the actual application process, the mechanism still has some security problems, such as the risk of tampering with the registration message, and that the user authentication data may be stolen by the attacker. By analyzing the security vulnerabilities of IMS AKA mechanism, and based on ECC algorithm principle, a modified AKA authentication mechanism is proposed. And the security of the proposed mechanism applied to the IMS network is evaluated and analyzed.

关 键 词:IP多媒体子系统 认证与密钥协商协议 椭圆曲线算法 初始会话协议 呼叫会话控制功能 

分 类 号:TN915.08[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象