Font Size: a A A

Application Research On PKI In Third Generation Of Mobile Communications

Posted on:2010-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:S YouFull Text:PDF
GTID:2178360278967037Subject:Electromagnetic field and microwave technology
Abstract/Summary:PDF Full Text Request
Third Generation Mobile Communication Systems (3G), is developed on the basis of Second Generation. In addition to traditional voice service, 3G also is able to provide many data services such as e-commerce, internet information services and multimedia information services. However, we must pay great attention to those security issues which data services bring about. In the third mobile communication systems, access security includes the confidentiality of the subscriber identity,entity authentication and the security of data. Through the use of authentication and key agreement protocol (AKA),3G security architecture implement the mutual authentication between user and network. Because Public Key Infrastructure has been developed to be a comparatively mature technology,and being used in many areas such as electronic commerce,electronic government,mobile communication network and so on. This paper firstly take out a detailed analysis and research. On 3G security architecture,then provides an overview of 3G facing security threats, security needs and objectives and an analysis of 3G security features. Detailed discussion is focused on the authentication and key agreement used in 3G' s access network and the security problems which could happen in the process. Finally,this paper introduced a PKI-based authentication system used in mobile communication network, which can meet the mobile communications users' end-to-end business security needs in the mobile communications network. In this paper, The final chapter of this article focuses on the authentication system needs analysis and design objectives, gives the system architecture of the implementation program, as well as the function of each module definition, study the digital certificate management model which can be applied to 3G networks, designs personal certificate management processes of the authentication system which could be used in the mobile communication network.
Keywords/Search Tags:Public Key Infrastructure, authentication and key agreement, Secure Socket Layer, access security, Certification Authority
PDF Full Text Request
Related items