Font Size: a A A

Research Of User Access Authentication Technology In 3G Network

Posted on:2007-10-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ChenFull Text:PDF
GTID:2178360185994512Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
More than 100 years have been passed when the wireless communication came to birth, and its applications have also developed from the Vehicle-mounted mobile communications into the mobile network. Due to the constantly development of the technologies as coding, cryptogram, micro-electronic, LSI and other related technologies, it has opened up a wider space for the development and application. However, with the extending of application and the increasing of customers' demand, more and more attentions have been paid on the security problems related to the mobile network.Because of the limited application of the early mobile systems and its none-sensitive business, there 'are not very strict requirement for the security. However, by the development of the 3G network, so many new services have been provided for the customers, and this also acquires a higher security level. The mobile network system not only have to identify the mobile users in order to guarantee the legal users to utilize the network resources, but also have to provide the way from which the mobile users can identify the network system in order to make sure the services the opponent provide are what they need. Only when the both side of the communication have been confirm the trusty of their opponents, they can establish a conversation security key based on it and exchange the information with safety.The author was working in UT Starcom from Oct 2004 to Aug 2005 and charging user access authentication design for GSN8000 system (Core Network of 3G) in ShenZhen R&D center. This system was used in Euro and Japan with best reputation. As an excellent designer in this system, author deeply research in user access authentication according to 3GPP and provide a total solution independently about authentication that based on public encrypt mechanism. Author's research focus on the defect of 3G security access process that maybe fatal to user and solve those defeat successfully. Following is the main contributing of author in 3G access authentication field:1. Analysis security mechanism defect of 3G mobile network and submit a...
Keywords/Search Tags:3rd Generation, Authentication, Wireless PKI, Elliptic Curves Cryptography
PDF Full Text Request
Related items