Font Size: a A A

Third Generation Mobile Communication Systems, Security Technology Research

Posted on:2006-11-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2208360155977187Subject:Power electronics and electric drive
Abstract/Summary:PDF Full Text Request
Along with the prosperous developing and popularity of the mobile communication technology, the more advanced security is required in the communication system. In 3G mobile communication system, more and more new services are provided, such as multimedia, interactive data transaction, electronic business and internet services, except for traditional voice service and data service. So how to guarantee the security of the information transmitted in the mobile communication system and the security of the network resources has become an urgent problem. This paper is devoted to the security of 3G mobile communication system. It first introduced 2G system architecture and the existing security defects. After that, it covered the security menaces faced by 3G, the security principles, objects and requirements. It also analyzed and studied the security characteristics of 3G. Detailed discussion was focused on the authentication and authorization in 3G access network, and the mechanisms adopted for providing data encryption service and data integrity service. The algorithms and protocols used to implement the above mechanisms were introduced. Through the research on encryption mechanism and principium of AKA, it analyzed the probable menace and attack in the process of authentication and key agreement. So this paper presented an improved scheme to ensured confidentiality of the information transmission and to enhanced the security of 3G, and avoided the attack to VLR. The 3G core cryptographic algorithm: KASUMI algorithm was researched in the paper, including its principles, components and application. Then the paper tested the algorithm security by programme and finally analyzed that KASUMI algorithm could resist mostly difference attacks. Its nicer security character was propitious to 3G mobile communication.
Keywords/Search Tags:3G, Mobile Communication, Security Algorithm, KASUMI
PDF Full Text Request
Related items