Font Size: a A A

Research And Implementation Of Secure Access Based On USIM In B3G

Posted on:2009-12-06Degree:MasterType:Thesis
Country:ChinaCandidate:X G HuangFull Text:PDF
GTID:2178360245496358Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
For mobile radio communications, the wireless access is the most important icon compared with fixed networks. The openness and fading features appeal for higher security. The second Generation (2G) Mobile system GSM uses smart card as subscriber identity module, which assures that the network authenticates the users and generates session keys. Secure access based on USIM in the third Generation (3G) Mobile radio network completes duplex authentication and covers the authentication weaknesses in GSM system. But their secure architecture is short of extensible, non-repudiation, identity authentication technology based on symmetrical algorithm, which is can't satisfy the new requirements of next communications. With the development of multi-application, multi-system, wireless network e-commerce and value-added services, the existing security mechanisms can't meet a high level of security demand in the Beyond 3G (B3G) network.The e-commerce-based wireless application and value-added services develop fast. For example, various services such as mobile stock, mobile securities, mobile procurement, and mobile payments all can be offered by mobile business. During the process of the transactions which make use of a 'non-face-to-face', 'non-connection-oriented' skills, the identity of the authenticity and non-repudiation of transactions are particularly important, in addition to the safety of the transaction itself. Advanced mobile business needs the security of identity which make a high requirement for the mobile terminals' capability at the aspect of identity authenticity. The security architecture and authentication mechanism of telecommunication smart card developed continuously. A new set of identity authenticity technology, fingerprint recognition, has been developed, and began to be widely used.Therefore, this article analysis the security mechanism and identity authentication technology in 3G network and UMTS authentication model, discuss access security features and mechanism in B3G Network for the security weaknesses, the algorithm shortcomings, the authentication vulnerabilities in 3G. In order to meet the development trend and security needs in B3G communication systems, this article designs and construct a multi-application smart card platform for access security in B3G, puts forward an identity authentication scheme based on the PIN code, fingerprint characteristics, Universal Subscriber Identity Module (USIM) card. This solution will satisfy the access security and identity authentication architecture for the next generation communication systems.Writing data security mechanism of the USIM card ensures the card data integrity and legitimacy, and avoids data disorder caused by interruption of data updating operations. The identity authentication based on PIN code, fingerprint and USIM card makes use of RSA cryptosystem and SHA-1 hash algorithm, and realizes mutual identity authentication among user, USIM card and the network. The scheme avoids masquerade attack, replay attack and the harm caused by illegal theft. The random factor is generated by the mutual parties to guarantee the authentication fairness. Pre-calculation is used in user ends to reduce the real-time calculation and make the scheme satisfy real-time requirement of mobile communication system. What is more important is that the article presents a non-symmetrical algorithm to protect the authentication information's non-repudiation and strengthen the user's domain security. It protects the information in authentication more safely. To a certain extent the expense of the single authentication time gains security enhancement.
Keywords/Search Tags:Beyond 3G Mobile Communication System, Access Security, USIM card, Identity Authentication
PDF Full Text Request
Related items