Font Size: a A A

Research And Implementation Of End-To-End Security Module In Mobile Communications System

Posted on:2010-12-24Degree:MasterType:Thesis
Country:ChinaCandidate:S FengFull Text:PDF
GTID:2178360278966389Subject:Information security
Abstract/Summary:PDF Full Text Request
Due to the openness of wireless channel in the mobile communication systems, security has been one of the key factors impacting the extensive used second-generation GSM system in China. On one hand, despite the use of the effective cryptographic technology to ensure the security of air interface, there are still plaintext transmission in the core network link and the node devices, and the information in the networks can easily be eavesdropped. On the other hand, most of the network equipments, core technology and intellectual property rights in China's public mobile communications network belong to foreign countries. The equipment backdoor and technical loopholes will pose a serious threat to users' privacy. Therefore, it is very necessary to research and realize the End-to-end Security System in the mobile communication networks, along with wide application prospect.The objectives of End-to-end Security System in the mobile communication networks are as follows: to provide users with end-to-end security solutions of voice, text messages and data; to develop high reliabe and secure End-to-end Security Module, End-to-end Key Management Center, Register Data Server and Encryption-supported Mobile Terminal; to provide users with end-to-end confidentiality, integrity and inter-user authentication to meet the management requirements of the country.In this paper, the End-to-end Security Module of the end-to-end security system is studied and realized. End-to-end security module provides end-to-end encryption and key management functions which are the key and core part to realize the whole system. End-to-end Security Module is realized mainly based on the smart cards. Mobile terminals communicated with the smart cards through the smart card reader. There are significant advantages to package the End-to-end Security Module in the smart cards. It permits using different encryption key management and end-to-end scheme in the same terminal.The major work of this paper is divided into two main parts: the first is to develop a new signaling protocol of End-to-end Security Module in mobile communications system; the second is to design and implement the end-to-end security module in mobile communication system based on the smart cards.The main achievements of the paper are:1. This paper proposes a new signaling protocol of End-to-end Security Module in mobile communications system. It achieves the functions of key management and encrypted voice communication of the end-to-end security module in mobile communication system. Furthermore, it ensures the security, reliability and integrity of the information communicated with the smart card.2. The end-to-end security module in mobile communication system is designed and implemented based on smart cards in this paper which completes the process of end-to-end encryption key management and encrypted voice communications. It provides the performance requirements of the end-to-end security smart cards as well as the corresponding functional tests.The smart cards designed in this paper have been successfully used in end-to-end security system of GSM network, and successfully realized the end-to-end encryption voice communications.
Keywords/Search Tags:mobile communication system, GSM, smart card, end-to-end security, signaling protocol
PDF Full Text Request
Related items