检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:董锵 罗国明 史宏逵 张永跃 DONG Qiang;LUO Guoming;SHI Hongkui;ZHANG Yongyue(Institute of Communication Engineering,Army Engineering University of PLA,Nanjing 210042,China;Nanjing University of Posts and Telecommunications,Nanjing 210023,China;Tianjin Municipal Big Data Administration Center,Tianjin 300221,China)
机构地区:[1]中国人民解放军陆军工程大学通信工程学院,南京210042 [2]南京邮电大学,南京210023 [3]天津市大数据管理中心,天津300221
出 处:《信息网络安全》2021年第1期88-96,共9页Netinfo Security
基 金:国家自然科学基金[61871399]。
摘 要:为适应行业移动通信专网发展和保密通话业务需求,文章针对专网独立业务控制特点,在应用IMS技术架构的移动通信专网中,提出一种向前兼容的专网功能结构模型。文章研究分析了多个可应用于IMS专网的认证和密钥协商方案,并根据归属地服务器是否参与认证过程,分端到端、端到服务器两类应用场景,综合比较各类认证和密钥协商方案的安全性能和运算开销,最后给出较优方案,为专网通信安全相关机制建设提供参考。In order to adapt to the development of the industry's mobile communication private network and the demand for confidential call services,in view of the independent service control characteristics of the private network,a forward compatible private network functional structure model is proposed in the mobile communication private network using IMS technology architecture,focusing on research and analysis of several authentication and key agreement schemes which can be applied to IMS private network.According to whether the home server participates in the authentication process,this article is divided into two types of application scenarios,end-to-end and end-to-server,and comprehensively compares the security performance and computing overhead of various authentication and key agreement schemes,and gives a better scheme,which is a private network provide reference for the construction of communication security related mechanisms.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.222.183.102