Font Size: a A A

3g Network Access Security Based On Public Key Technology

Posted on:2007-10-19Degree:MasterType:Thesis
Country:ChinaCandidate:F LiuFull Text:PDF
GTID:2208360185983016Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile communication system and their application, the security of mobile communication system is becoming more and more important.Within the UMTS network, User can get more new services by mobile terminal, and the security of network access between the mobile equipment and UTRAN is the basis of all the new services, which belongs to the radio part and is easy to be attacked.In the 3rd mobile communication system, The security of access mainly includes the confidentiality of the subscriber identity , entity authentication and the security of data. 3G security architecture introduces temporary subscriber identity to protect the permanent identity and location information of user; uses authentication and key agreement protocol to implement the mutual authentication between user and network, and produces the cipher key and integrity key; uses the CK and IK to protect the data over the radio link.AKA is the core part of 3G access security architecture. However, during the procedure of AKA execution the network will request the user to send its permanent identity, and during the distributiong of authentication data, no entity adopts security measures to protect data. So the intruder can easily attack the AKA to get the access of network resource and user' s private information. Besides, the authentication data is transmistted in plain text between the visited location registrys, which put AKA in an unsecure environment and breach the confidentiality of authentication and user identity data.WPKT is the wireless PK1, which apply traditional PKI to wireless environment by extending and optimizing it, solves the policy matter of the mobile electronic business, and provides the security service with the...
Keywords/Search Tags:WPKI, confidentiality, authentication, user identity, access security
PDF Full Text Request
Related items