Font Size: a A A

The Security's Research And Strategy Of The Whole Third-generation Mobile Communication System

Posted on:2010-07-22Degree:MasterType:Thesis
Country:ChinaCandidate:H Y YuFull Text:PDF
GTID:2178360275485920Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The third-generation(3G) mobile communication system is a global network system.The third-generation mobile communication system is built on the base of the second-generation(2G) mobile communication system.It inherits the secure advantages of 2G mobile communication system,adopts the secure characteristics that have been proved to be essential and strengthened of 2G mobile communication system,and its new business environment demands higher security of network.This paper researches the security of the 3G mobile communication system mainly.Firstly,it introduces the development of wireless network system's security, analyzes 2G system's architecture and existing security flaws,and points out the advantages of 3G system on security.Then,the secure principles,aims and threats of 3G system are summarized.The secure architecture and characteristics are analyzed in detail.And this paper investigates deeply the mobile status identity,authentication and key agreement protocol,the specific process of local authentication and connection's establishment, the data's protection,and also the arithmetic and protocol of the above business.After that,based on the lucubration of 3G's core technique,this paper analyzes the proven design and realization approach,points out the limitations on security,and proposes relevant strategic innovations.It includes the following aspects:(1) Detailed settlement work has been done to the dynamic uni-directional authentication accepted in 3G.(2)The BAN logic authentication method is pulling into.Authentication and key agreement protocol are tested in security performance by using BAN logic.It is proved that there is still secure vulnerability in 3G mobile system.Based on the above analysis,a new modified program is proposed.(3)According to the arithmetic requirement,the design proposal of authentication and key assignment based on AES kernel is supplied.(4) According to the arithmetic requirement,the design proposal of encryption and integrity algorithm based on KASUMI kernel is given.(5)When 2G and 3G coexisted,on different environment,the compatible problems of security are presented.3G system has many advantages on security,but its security is not absolutely safe.This thesis discusses mainly on the security interrelated problems of 3G.Based on the research of key technologies of 3G.it is analyzed that loopholes and flaws of security are existed,so related improvements are provided to resolve this.After the improvements,the 3G system has more strong anti-attack abilities.At the same time, the specific processes are designed and the interrelated key technologies are resolved.
Keywords/Search Tags:G, secure mechanism, dynamic authentication, authentication and key agreement protocol, BAN
PDF Full Text Request
Related items