Font Size: a A A

Analysis Of The Security Mechanism In Mobile Communication System

Posted on:2009-05-13Degree:MasterType:Thesis
Country:ChinaCandidate:J Y NiuFull Text:PDF
GTID:2178360245470032Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Nowadays, the communication technology is developing very quickly. Along with its popularity, mobile communication plays more and more important role in people's social life. As people frequently use mobile communication for information exchange, how to guarantee the security of the information transmitted in the communication system and the security of the network resources has become an urgent problem.Based on the current second-generation (GSM) and third-generation (WCDMA) mobile communication system, this paper is focusing on the information security problems in mobile communications. First of all, wireless communication system security threats and the need for the introduction of safety measures as well as the main method have been outlined. Then the two sub-sections respectively analyse the two different systems of its security system, security objectives, security mechanisms, security flaws and other issues. And further research with the protocol and algorithm are discussed in detail. The main research work and achievements include:1,Based on the detailed analysis of the GSM security mechanisms, the results show that in the GSM security system there are still many deficiencies. For example: authentication mechanism is unilateral; encryption mechanism is based on the base station; do not consider the integrity of information and algorithm loopholes, etc;2,Based on the detailed analysis of the security mechanism in 3G WCDMA system, we can see that the 3G security still do not fully achieve its security objectives;3,Discussed the 15 kinds of security algorithm used in WCDMA system, and using Visual C++ to simulate the confidentiality algorithm f8 and integrity f9 algorithm which based on KASUMI. The analysis results show that the algorithm designed to fully comply with the safety and performance;4,Using BAN logic to analyse the GSM authentication protocol and the insecurity of the authentication process of the 3G AKA.
Keywords/Search Tags:mobile communication system, security mechanism, authentication and key agreement(AKA), BAN logic, security cryptography
PDF Full Text Request
Related items