Font Size: a A A

The Realization Of Wireless Monitoring System Based On GPRS With Security

Posted on:2007-08-10Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhouFull Text:PDF
GTID:2178360182991073Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of society, people' s requirement of communication— especially wireless communication, is not only limited in audio service any more, but also more and more aims at data transport services. The demand for data transport capacity including data rate, network delay and security is becoming more and more high. There are many methods of wireless data transport, such as wireless radio, CDPD, method based on mature wireless network, etc. All the methods with different characters could satisfy different demands. After many readings about application of wireless data transport, author notices that the security—the most important issue is ignored in most applications by designers. The essentiality of attaching an independent encryption and authentication system to the wireless monitoring system is discussed in this paper. The realization of encryption and authentication system in this wireless monitoring system is also put forward.The monitoring system realized in this paper, based on GPRS, applies a newly developed chip—GR47 by Sony Ericsson. Based on the experience as R&D developer in tele-communication corporations, author introduces network structure and features of GPRS network. Four frameworks of GPRS network are introduced emphatically, and their sketch maps are also offered. The design of wireless monitoring system based on GPRS is introduced from two sides: the realization of monitoring center and the realization of mobile station. Several popular GPRS network access schemes for control center are researched in detail, and advantages and disadvantages are analyzed, then one most suitable scheme is chosen for this design.The defect of GPRS/GSM security is analyzed and the conclusion that wireless data transport need independent encrypting and authentication system is drawn out. Author introduces modern cryptology, analyzes several typical encryption algorithmsand lays the emphasis on the realization, the strength and potential attack of DES algorithm. Compared with wireline data transport system, wireless system requires new request about encryption. At end of the paper, the realization of real time encryption and authentication system suitable to wireless monitoring system is introduced according to the character of system and data. The augmentation and theory foundation of the encryption and authentication system are also proposed.
Keywords/Search Tags:GPRS, 3DES, Encryption, Authentication, Wireless Monitoring System
PDF Full Text Request
Related items