Font Size: a A A

Research And Software Realization Of Security Of WCDMA Protocol Stack Based On Windows CE

Posted on:2008-04-12Degree:MasterType:Thesis
Country:ChinaCandidate:D SunFull Text:PDF
GTID:2178360245492932Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Nowadays, the communication technology is developing very quickly. Along with its popularity, mobile communication plays a more and more important role in people's social life. As people frequently use mobile communication for information exchange, how to guarantee the security of the information transmitted in the communication system and the security of the network resources has become an urgent problem.WCDMA as the outstanding one of 3G has the rapidly developing speed. This dissertation has researched the WCDMA Security protocol on the occation of the development of 3G.The aim of this paper is to develop software of Security of WCDMA protocol stack on UE, based on embedded operation system Windows CE 5.0, which belongs to core software of WCDMA terminals.The work is challenging since it deals with core techniques and reference materials are very scarce, which is also the creative point of the paper.This paper firstly describes the background of WCDMA, the development and the framework of the WCDMA protocols. Secondly it describes the embedded operation system and development environment. Thirdly it describes the Security protocols, mainly the procedures and states of the authentication, authorization in 3G access networks, and the mechanisms adopted for providing data encryption service and data integrity service. It helps to comprehend the implementation of the protocols.As the achievement of this paper, it researches the implementation and testing of the Security protocols, mainly the authentication and encryption service. It describes the design blue print, protocol architecture, and the testing method by the development environment-Platform Builder.After detailed testing work, it is proved that the scheme of realization of protocol in this paper can finish main functions required in the specification. So the expected aim in this paper has been reached.
Keywords/Search Tags:WCDMA standard, authenticaiton, encryption, intergrity service
PDF Full Text Request
Related items