Font Size: a A A

Research On The Establishment And Technique Of Safety Schemes Applied To Mobile Communication Netowrk

Posted on:2012-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2178330335999591Subject:Control Engineering
Abstract/Summary:PDF Full Text Request
With the unceasing development of the universal communication technique, it has been an undoubted result that the communicating system in our country developed from 2G to 3G The application fields of mobile communications are extending rapidly from traditional voice service to date and multimedia services and will further merge with the Internet. Due to diversification of services, security problems are also becoming prominent.This paper researches the securing of the 3G mobile communication system mainly. In the first, it introduces the development of wireless network system's securing, analyzes 2G system's architecture and existing security flaws, and points out the advantages of 3G system on security. Then, the new business, the secure principles, aims and threats of 3G system are summarized. The whole security framework and function work are presented. Security characteristics necessary to the third generation mobiles communication are detailed described.Thirdly, reach the 3G's core technique, this paper analyzes the realization approach and proposes relevant strategic innovations for the limitations on security. In 3G, the mutual authentication between the user and the network had been presented. Detailed settlement work has been done to the dynamic unidirectional authentication accepted in 3G. Authentication and key agreement protocol are tested in security performance by using BAN logic. It proved that there is still secure vulnerability in the third generation mobile system. Based on it, a new modified program is proposed. According to the arithmetic requirement, the design proposal of encryption and integrity algorithm based on KASUMI kernel is given. Besides, authentication and key agreement algorithm is designed by using the kernel function of SHA. On different environment, the different security context should be performed in user authentication, when 2G and 3G coexisted.In next part of this paper, the framework, the security threats, the security requirements and mechanism of systemic exchange between 3G mobile network and WLAN was particularly analyzed as well as the security mechanism of 3G systems, and the accessing authentication interconnection between 3G system and WLAN system was analyzed in details.Finally, problems to be settled are proposed based on the sum-up work.
Keywords/Search Tags:3G, Mobile Communication, secure mechanism, authentication and key agreement protocol
PDF Full Text Request
Related items