Font Size: a A A

Key Technology Research On GSM/UMTS Hybrid Network Security

Posted on:2012-07-04Degree:DoctorType:Dissertation
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:1488303356972599Subject:Information security
Abstract/Summary:PDF Full Text Request
GSM/UMTS hybrid network is a necessary phase in development from the second generation mobile communication system to the third generation mobile communication system. It is also an inevitable result with the development of mobile communication technological. GSM/ UMTS hybrid network has emerged and been widely used in many countries and regions. It has generated favorable economic benefits and many new security problems of it have been found at the same time. GSM/UMTS hybrid network security becomes one of the problems that need urgent solutions in the domain of the mobile communication security.In this paper we analyze the GSM/UMTS hybrid network security mechanism and summarize the security problems existing in the current GSM/UMTS hybrid networks. We do research on the principle and implementation mechanism of security model, security strategy and mutual authentication mechanism with emphasis. Combining the features of GSM/UMTS hybrid network, we design the security model and security strategy that are suitable for hybrid network environment. Finally, we improve the original mutual authentication mechanism and set up a new hybrid network with higher security mutual authentication mechanism. The rest of this paper is organized as follows.1. We introduce the development, research background and the necessary related knowledge of GSM/UMTS hybrid network. We also propose the problems need study and solve in future.Then we study the security mechanism of GSM/UMTS hybrid network in detail. We firstly describe the construction and development situations of the current GSM/UMTS hybrid network. And then, we analyze the security features of GSM network domain, UMTS network domain, and the roaming authentication between networks. Finally, we summarize security problems existing in the hybrid network from the perspectives of air interface, core network, equipment and service management, authentication and key management of GSM/UMTS hybrid network and sum up the domestic and international current research situation about this field.2. We analyze and design the security model of GSM/UMTS hybrid network. Combining the features of the hybrid network, we describe the security requirements, design principles of security model in hybrid network based on introducing the relevant definition and classification of security model. Furthermore, we design logical and physical models suitable for GSM/UMTS hybrid network after comprehensive consideration of equipment, strategy, management, service, testing and other security elements. At last, we formally describe part of the functions of the model.3. We study and design security strategy of hybrid network. Above all, we describe the concept and level architecture of security strategy. The common methods of strategy description are also introduced. Afterwards, we figure out the necessity of strategy management and the requirements of security strategy in the hybrid network. Next, combining the structural features of the hybrid network, we design the security strategy suitable for the hybrid network and discuss the implementation framework, content, usage, storage of the security strategy. Finally, we analyze the security features of the strategy.4. We study and design the high security mutual authentication mechanisms in GSM/UMTS hybrid network. Firstly, the methods of authentication in current hybrid network are introduced and analyzed. The security problems existing in current mutual authentication mechanism are also summarized. Secondly, we design a high security mutual authentication in the circumstance of GSM/UMTS hybrid network according to the principle of high security mutual authentication. Compare the proposed mutual authentication mechanism with the origin one, the results show its high security features. Moreover, we also point out its shortcomings. At last, we further summarize the main conclusions obtained from the previous chapters and point out the main research directions in future.
Keywords/Search Tags:GSM/UMTS hybrid network, security model, security strategy, mutual authentication
PDF Full Text Request
Related items