Font Size: a A A

Research On The Security Of Coordinated Multiple Point In LTE-Advanced System

Posted on:2012-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y Z WuFull Text:PDF
GTID:2178330335950605Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
ABSTRACT:LTE-Advanced is the evolution of Broadband wireless communication technology standard 3 GPP LTE, which is the most popular technology at present. In order to fulfill the requrements of LTE-Advanced system such as bandwidth, peak data rate, and average throughput, the cell edge user throughput, latency and compatibility, 3GPP brings in many new technologies, Coordinated multiple point transmission is one of the new technologies for LTE-Advanced system which is proposed by 3GPP.As one key techology, coordinated multi-point (CoMP) transmission/reception is considered for LTE-Advanced as a tool to improve the coverage of high data rates, the cell-edge throughput and/or to increase system throughput in both high load and low load scenarios. In this respect, it has incomparable advantages compared with other technologies. However, it also puts several challenges to the security of LTE-Advanced system. One of the coordinated multi-point (CoMP) transmission/reception technologies JP (Joint Processing) can support multiple unsafe physical nodes to share the user's data, which is different from the traditional LTE communication manner. It is important for LTE-Advanced system to guarantee the safety of these data and the normal communication. Only if the CoMP security solutions have been proposed, the LTE-A dvanced system can formal applies this technology.This paper is conducted through an in-depth theoretical study accessed to domestic and foreign literature and analysis based on the security threats, security services and security mechanisms of mobile communication system. As backward evolution technology of LTE, the LTE-Advanced system shall support the backward compatibility with LTE.The security requirement of LTE-Advanced should be based on the LTE system, an mobile equipment that has LTE capability shall be sufficient for accessing LTE-Advanced system.The main content of this paper is shown as follows:First, the system architecture of the LTE, security threats exsiting in the network and the security architecture of the LTE have been introduced.Second, I detailed expounded the security solutions and the authentication mechanizm of the LTE system based on the threats. Then I summed up the shortcomings of the authentication and key agreement after analysising it with the utilization of BAN logic. At the same time, an improved user identification mechanism used to protect the permanent subscriber identity is raised.Finally, different categories CoMP and scenarios are described in detail. After that I analyze the security requirements when UE is accessing the network or mobiling in the network at different scenarios. Then the corresponding security solutions based on the practical application is put forward, and a detailed signaling transmission process is given.
Keywords/Search Tags:LTE-Advanced system, Coordinated Multiple Point Transmission, Security
PDF Full Text Request
Related items