Font Size: a A A

Study On Authentication Of 3G Mobile Communication

Posted on:2005-03-01Degree:MasterType:Thesis
Country:ChinaCandidate:P ZhangFull Text:PDF
GTID:2168360125953103Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of the third generation mobile communication, its security becomes more and more important, the network access security plays an important role in the security of 3G mobile communication. How to improve the security and feasibility of authentication in the mobile communications is very significant to 3G mobile communication.This paper focuses on the authentication mechanisms of 3G network access security. Firstly, it introduces the security menaces, principles, objectives, requirements and the whole security structure of 3G mobile communication. Secondly, the user identity confidentiality, authentication and key agreement, data confidentiality and data integrity of 3G network access are deeply discussed, and then the paper analyses the security objectives achieved by the authentication and key agreement protocol and points out the defect of the protocol. At the same time, based on the protocol, a new public-key based authentication and key agreement protocol are proposed, which improves the security and efficiency of authentication, then the formal analysis of the new authentication protocol is given. Thirdly, the paper analyses the defect of private-key based authentication mechanisms in the 3G access network, and the advantages and feasibility of public-key authentication mechanisms. After that, it introduces the public-key authentication mechanism proposed by Siemens AG, and a detail analysis of its security is given. Finally, based on the Siemens protocol, using Rabin cryptosystem and Schnorr identification protocol, the paper develops a public-key based authentication mechanism of 3G mobile access network, which improves the efficiency on the mobile user side.
Keywords/Search Tags:Mobile Communication Security, Authentication, Public Key Infrastructure
PDF Full Text Request
Related items