Font Size: a A A

The Security Resolvent And Realization Of Mobile Data Transmission

Posted on:2008-12-24Degree:MasterType:Thesis
Country:ChinaCandidate:W J WangFull Text:PDF
GTID:2178360272967143Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of Short Message (SM), the request of higher security is brought by both the mobile service user and the Service Provider (SP). The security of Short Message Service (SMS) has been the choke point of the development of Value-added Service. At present, more and more plans to resolve the difficulty which has been faced with by SMS has been put forward, but the network of SM is provided by Network Operator (NO) and the useful load is provided by the NO which is limited, so the useful load of these security plans based on the useful load provided by NO will become lesser and lesser. Furthermore, the other request also can not been guaranteed, for example real-time request, the reliability and so on. Therefore, considering the security problem without considering the role played by the NO can not resolved the basal security problem.The Security Resolvent Scheme of Mobile Data Transmission is based on the study of the attack coming from the exterior of mobile network and the study of the security of the protocol used by the network facility. The load of the network facility and the demand of the mobile user are considered and the idea of Internet differentiated Service is used for reference, the scheme has been brought forward which provided three grades of the SM security transmission flow. The flow grade one provides the lowest security grade service and the flow grade three provides the highest security grade service. The relationship among the flows is step-up. In other words the next flow has inherit the security techniques of the flow ahead and it also has some other security techniques which are used to guarantee that the next flow has the higher security. The scheme can be used without great modifying to the network facility, so it has good character of transplantable. Meanwhile, the scheme can also run over the protocol used by the network facility, so it has good character of compatibility.Above all, The scheme brought forward has improved the performance of security of SM transmission which also provide more choices for the mobile users and have good compatibility to the protocols currently being used including both the CMPP protocol and the SGIP protocol. It can resolve the problem the NO faced and it guarantees the profit of the mobile user, SP and the NO, thereby it guarantees the development of the mobile short message Value-added services.
Keywords/Search Tags:Information security, Differentiated Service, Short Message Transmission, CMPP, SGIP
PDF Full Text Request
Related items