Font Size: a A A

Research On The Security Of 3G Networks

Posted on:2009-09-12Degree:MasterType:Thesis
Country:ChinaCandidate:W WangFull Text:PDF
GTID:2178360242477946Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The security of the third generation mobile system is built on the security of the second generation mobile system,by adopting the secure that have been proved essential and strengthened of the GSM generation mobile system,and rectifying the disadvantage of the mobile system. And basis of the characteristic other second generation.In the third generation mobile system(3G)the mutual authentication between the user and the network had been presented. The network uses the dynamic bidirectional authentication way to authenticate the user. And the user uses the dynamic unidirectional authentication way to authenticate the network. Specially, the dynamic unidirectional authentication is the important security feature of the third generation mobile systemvaried to 2G system.The functions of f1,f1~*,f2,f3,f4,f5 and f5~* are used in the authentication and key agreement protocol.This paper is devoted to the security of 3G mobile communication system. It first introduced 2G system architecture and the existing security defects .After that,it covered the security menaces faced by3G, the security principles,objects and requirements. It also analyzed and studied the security characteristics of 3G. Then summarizes the security threats 3G architecture is facing by analyzing the security features of 3G security architecture protocol,is proposed.Then a improvement to an selfcertified public key based authentication scheme including Public Key Broadcast Protocol and Self-certified Public key based Authentication and Key Agreement Protocol is presented for 3G systems. And it is based on the elliptic curve discrete logarithm problem, we adopt approaches to combining Public Key Broadcast Protocol with Self-certified Public-key based Authentication and Key Agreement Protocol.
Keywords/Search Tags:3G Security, Security Algorithm, Authentication and Key Agreement Protocol, ECC
PDF Full Text Request
Related items