Font Size: a A A

Research On Secure Access Technology For 4G Wireless Network

Posted on:2012-02-20Degree:MasterType:Thesis
Country:ChinaCandidate:L L WangFull Text:PDF
GTID:2178330335466967Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the constant interconnection between wireless network and the Internet, mobile communication will become one of the most dynamic industries. Because of the demand for the data communication and the development of multimedia services, the fourth generation mobile communications, which adapts the mobile data, mobile computing and mobile multimedia operation, begins to rise. Currently, many countries and regions all over the world are stepping up research on 4G, which includes some of well-known forums and the commonwealths, such as the WWRF, mITF, Future and so on. Faced with the complexity of the wireless netwok environment, the trend of coexistence of a variety of wireless communication technology, and the background of integration of heterogeneous networks, the security of 4G wireless network becomes more complex and important. The research on the access technology of 4G wireless network, which is the foundation and core issue of security of the 4G wireless network, has considerable significance and value.On the base of analysis of the security threats and security needs in the security access authentication of 4G wireless network, combining with the existing research, a new secure access authentication scheme based on self-certified public key system was designed with the the Protocl Derivation System. Because of the mobility and roaming of wireless mobile terminals, to improve the efficiency and safety of the access process of mobile terminals, the new scheme included two protocols, the first/switch access authentication protocol and reaccess authentication protocol. Because the analysis and proof of security protocols is critical for modern security network system, the session authentication and key confidentiality of the new protocols was proved with the Protocol Composition Logic, and the security performance of the new scheme was comprehensively was analyzed. The results showed that the new scheme not only has the session authentication and key confidentiality, but also againsts the pseudo-base station attack and repley attack, provides undeniable services and identity privacy. Moreover, the scheme can improve the access efficiency and security of the mobile terminals.
Keywords/Search Tags:Self-certified public key, Protocol composition logic, Protocol derivation system, Authentication protocol, 4G wireless network
PDF Full Text Request
Related items