Font Size: a A A

Discusses The Wireless Communication System Safety And The Strategy Shallowly

Posted on:2009-02-22Degree:MasterType:Thesis
Country:ChinaCandidate:S G WuFull Text:PDF
GTID:2178360245970228Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
As the technology developing fleetly, the capability of mobile telephone become better and better. In many ways , it can compare with personal computers. Attracting more and more mobile phone users, become inseparable partners. In the mobile phone brings convenience to the people at the same time, their safety performance has not been corresponding safeguards. Before a single function of mobile phones, are basically not exist on the safety of personal computers. However, as the phone intelligent, and the wireless networks would be faced all the security problems as Internet. In addition the special nature of wireless networks to security issues particularly prominent. Discussion on the issue of wireless network security and strategy has important significance.This paper discusses the security of wireless communication system, and focuses on the TETRA networks security issues; finally, introduces the plan of end-to-end encrypted communications system which based on the "Recommendation 02 End-to-End Encryption". In the first chapter , narrating the wireless network security issues and the critical importance. From many areas discussed the security issues, later introduced the wireless network security standards. In the second chapter, discussed the TETRA(terrestrial wireless communications system) network security problems and solutions. Analysis the security risks, and the security needs of the system and services, at last introduced the TETRA digital trunking system security system. Chapter III is the core thesis, First detailed description of the public digital mobile communication network system end-to-end encryption system structure, later detailed description of the core system------registration data server.
Keywords/Search Tags:wireless communication, tetra, networks security, end-to-end encryption
PDF Full Text Request
Related items