Font Size: a A A

Mobile Communication Network Security Strategy

Posted on:2009-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:Z H DengFull Text:PDF
GTID:2208360245970251Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Along with the prosperous development and popularity of the mobile communication technology, the more advanced security is required in the communication system.Firstly, based on the analysis of informational security theory, system architecture, adopted security measure, user authentication, accepted ciper function of the second generation mobile communication are discussed. And security disadvantages belong to GSM system are analysed.Secondly, the whole security framework and function work are presented. Security characteristcs necessary to the third generation mobile communication are detailed describled. The radio access encryption, data confidentiality and data integrity technology are also deeply discussed.Thirdly, anthentication and key agreement protocol are tested in security performance by using BAN logic. It proved that there is still secure vulnerability in the third generation mobile system. Detailed settlement work has been done to the dynamic unidirectional authentication accepted in 3G. Anthentication and key agreement algorithm is designed by using the kernel function of AES or SHA. The ciper algorithm and integrity algorithm are designed on the basis of the kernel function of KASUMIN. In the different enviroment, the different security context should be performed in user authentication when 2G and 3G coexisted.Finally, problems to be settled are proposed based on the sum-up work.
Keywords/Search Tags:mobile communication security, security algorithm, authentication and key agreement protocol, dynamic authentication
PDF Full Text Request
Related items