Font Size: a A A

Research Of WPKI-based Security In Mobile Communication

Posted on:2008-01-30Degree:MasterType:Thesis
Country:ChinaCandidate:Z L XuFull Text:PDF
GTID:2178360272967517Subject:Information security
Abstract/Summary:PDF Full Text Request
Mobile communication has become an indispensable part of this age. People are demanding more and more on information security as they enjoy the conveniences of telecommunication. The future mobile communication systems will provide not only the traditional voice, data and multimedia operations, but also some new businesses, such as e-commerce and Internet service, etc. Mobile networks will evolve into an open network. As a result, security will become one of the core issues in mobile communication. Based on the successful experience of PKI in Internet, it is assumed that applying PKI technologies in mobile communication systems can safeguard the wireless networks with better performance.Through the research of the present 3G security architectures, security features were summarized and existed defects were pointed out. Requirements and feasibility were analyzed and a scenario of deploying WPKI components in 3G network architecture was proposed in order to implement WPKI in 3G security.A Wireless Transport Layer Security handshake protocol based Authentication and Key Agreement scheme was proposed corresponding to the Authentication and Key Agreement process between subscribers and networks. The new scheme can not only provide the mutual authentication and key and algorithm negotiation between subscribers and networks, but also promote the mobile e-businesses.Against the security flaws of the existed mechanism of user identity confidentiality protection, a public-key certificate based user identity confidentiality protection mechanism was proposed and its security performance was analyzed. Using public-key certificate, the user identity confidentiality, user location confidentiality and untraceability were realized.
Keywords/Search Tags:Wireless Public Key Infrastructure, Wireless Transport Layer Security, Authentication and Key Agreement
PDF Full Text Request
Related items