Dissertation > Excellent graduate degree dissertation topics show

VoIP Security Mechamism Research and Implementation Based on the Mobile Network

Author: ZuoHui
Tutor: WangRuChuan
School: Nanjing University of Posts and Telecommunications
Course: Information network
Keywords: Wireless Mobile Network VoIP Security Authentication Protocol Trust Model
CLC: TN916.2
Type: Master's thesis
Year: 2012
Downloads: 68
Quote: 0
Read: Download Dissertation


Nowadays the mobile communication has entered the third Generation times, the carrying network of the mobile communication system is developing to flat and all over the IP on the base of the NGN network architecture, with the development of the Internet and the user‘s increasing demand of the mobile digital services, the concept of mobile Internet was proposed as the main profit growth point in the future, especially the next generation mobile network framework proposed by China Mobile, which is a flat and all over IP mobile carrying network architecture integrating the P2P technology. In this background, the VoIP technology which transfers the voice data through IP datagram and realizes voice calls through the packet switching technology gets vigorous development. Compared with the current extensive used analog circuit communication technology, it has lots of advantages. Such as simpler network structure, more integration of the business, more varied service type, more low cost, easier to attract customs and so on. So it will become the first choice of mobile user‘s voice calls business in the near future. Although the development trend of the VoIP technology is irreversible, as the inherent security problem of the traditional packet switching mode and the open feature of the future network architecture, VoIP technology faces numerous security problems, the most outstanding are two aspects: one is the security of the terminal access user‘s indentity and personal information and the other is the trust problem among users.In order to protect the security of the VoIP system user‘s voice data and personal data, this thesis puts forwards a Two-way user authentication and key agreement protocol based on PKI. This protocol makes full use of the digital certificate of the PKI and it has the advantages of high safety, asymmetric, easy operation and so on. This thesis also analyzes the safety of the protocol and discusses the algorithm negotiation mechanism which is used to protect the confidentiality and integrity of the voice and signaling data in the VoIP system.According to the lack of the mechanism to describe and evaluate the trust relationship among the members of the VoIP system, this thesis proposes a new trust model based on the Bayesian probability prediction theory and the weighted thought. The model describes the node‘s trust value in several aspects, including the power of the node, online time, history data record and so on. The thesis also gives the calculation formula to calculate the trust model and it‘s reasoning process and a detailed description of the process to gain, calculate and update of the trust value.The last part of this thesis introduces the design and implementation of the prototype system, especially in detail describing the module partition and working process.Thus verificating the effectiveness and feasibility of the VoIP security mechanism through the realization of the prototype system.

Related Dissertations

  1. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  2. The Design and Implementation of Security Mechanism of Embedded Dependable Computer,TP309
  3. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  4. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  5. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  6. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  7. Military exercises in the Corps of Engineers engineering equipment maintenance to protect the allocation of resources,E251.2
  8. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  9. Study on US Veterans’ Social Security System and Its Enlightenment to China,E712
  10. Yellow phosphorus storage tank area of Safety Evaluation,TQ126.317
  11. The Study of Social Security System of the Fishermen of Guangdong after the Beibu Gulf Demarcation,F323.89
  12. Health protection of migrant workers,D412.6
  13. Research on Selection and Construction of the China’s Social Security Budget Pattern,D632.1
  14. Comprehensive Evaluation of Ecological Security of Land Application,X826
  15. Study on Evaluation Index System for Land Ecological Security,X826
  16. Urban Community Security Service Research in Terms of New Public Service Theory,D631.4
  17. The Research of Dynamic Trust Model on Cloud Computing Platform,TP309
  18. Research on the Social Security of Fishermen under the Harmonious Society,D632.1
  19. Genetically Modified Food Ethics,B82-05
  20. On the systematic construction of the Chinese Communist Party democracy,D262.11
  21. The Analysis about Modes of Exchanging Land Contracted Management Right for Urban Social Security,D632.1

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Phone > Telephone lines, telephone network
© 2012 www.DissertationTopic.Net  Mobile