Font Size: a A A

Design And Implementation Of Middleware Architecture For Mobile COmmunication Security

Posted on:2007-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:H X MaoFull Text:PDF
GTID:2178360182966719Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
From last century, the mobile communication systems have been progressed rapidly. After eliminated the 1st generation system and employed the 2nd generation system for a long time, we enter into the time of 3rd generation. The advancement from 1G to 3G brings us better and better bandwidth. Because of the high bandwidth, more and more new services come out. So the security of our mobile networks and systems become more and more important. Though the existing communication systems have improved a lot in security, but the faults still exist and are threatening the users' commmunication security.This paper will analyse the security of the exsiting mobile systems, such as GSM and UMTS. From our analysis, we know that GSM and UMTS have really improved a lot in security. But the security accidents of mobile communication in recent years prove that the existing systems still have serious faults. For these security faults, they can not fulfill the security requirements of some special domain and departments.This paper designs a robust middleware architecture for mobile communication systems. The middleware can be deployed on existing mobile systems. Through intelligent mobile equipments and home security environments, we can supply extra security. We design two protocols to implement the security mechanism of our middleware architecture. Besides the two protocols, the security mechanism also includes integrity control. As we know, the encryption is the footstone of authentication and integrity control, so we introduce the principle of choosing encryption algorithms.At last, we give the integrated flow of a communication session. We can see that, our middleware architecture can be deployed on various mobile communication systems. Through the performance analysis, we show that the security improved a lot just at the cost of an acceptable descent in performance.
Keywords/Search Tags:Mobile communication, Intelligent mobile equipment, Home security environment, Authentication and key agreement, Encryption algorithm, Integrity control
PDF Full Text Request
Related items