Font Size: a A A

Research On The Key Technologies Of Identity Authentication And Content Security Of Third Generation Network

Posted on:2011-07-09Degree:DoctorType:Dissertation
Country:ChinaCandidate:D F ZhangFull Text:PDF
GTID:1118330335992321Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Authentication and content security are two key issues of the security of 3rd Generation network. The main characteristics of 3rd Generation network, which are called Mobile Internet, are not only the traditional voice services, but also the rich multimedia data services. Business diversification puts forward new demands to the access security and content security of 3rd Generation network.In 3rd Generation network, one of the core technologies of network access security is authentication and key agreement, called AKA, which is the basic guarantee for secure communication and the protection of the interests of users and the network operators. As part of call setup, authentication and key agreement protocol plays a pivotal role. Therefore, the security analysis and improvement for authentication and key agreement protocol of 3rd Generation network has been an important topic in the field.Content security research on multimedia data services of 3rd Generation network is developed in recent years. The open feature of 3rd Generation network and the characteristics of multimedia data, which are easy to copy and distribute, make the researches on multimedia content protection and management are well worth looking into. Digital watermarking technology is an important technology of multimedia information security which is developed in recent years. The key application areas of digital watermarking technology are the copyright of digital content copyright protection; content authentication and integrity inspection.This thesis focuses on the techniques of authentication and key agreement and the multimedia copyright protection of 3rd Generation network. One improved authentication and key agreement protocol which resists against MITM attack are presented, and two digital watermarking algorithms which could be used to the copyright protection are present. Besides, the interlink and intercommunication mechanism between different digital rights managements of 3rd Generation network is discussed. The main content of this thesis is summarized as follows:1. An in-depth analysis of the 3G network authentication and key agreement protocol security are proposed based on the security framework of 3rd Generation network, and the security risks of 3rd Generation network authentication and key agreement are resulted.2. An improved AKA protocol is proposed. Based on the security risks, an improved AKA protocol is proposed, called DH-AKA protocol. DH-AKA protocol could resist against the MITM attack, and implement mutual authentication between VLR and HLR and between ME and VLR.3. A digital watermarking based on edge detecting is proposed. Based on the research of data redundancy and edge detecting, a new watermarking algorithm is proposed, which embed the watermark into the edges of a picture. This new algorithm can resist against the lossless format transformation.4. An improved audio watermarking algorithm which based on time-domain frequency spread technology and echo hiding technology is proposed. This algorithm combines the two technologies together; frequency spread technology makes this new algorithm resisting DA/ADconverting attack, while echo hiding technology compensates the loss of watermark capacity which is reduced by frequency spread technology.5. A DRM bridge mechanism is designed. There is no uniform standard for DRM standards, so based on the research on the interlink and intercommunication mechanism between different digital rights managements, a DRM bridge mechanism is designed, which is responsible for the interlink and intercommunication mechanism between different digital rights managements of 3rd Generation network.
Keywords/Search Tags:digital watermark, AKA protocol, authentication, DRM, 3rd Generation network
PDF Full Text Request
Related items