Font Size: a A A

Based On The Cdma Mobile Communication Network Security System Design

Posted on:2011-10-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y H PengFull Text:PDF
GTID:2208360308966632Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With a wide range of the construction and operation of the third generation mobile communication network, more and more people are using the CDMA mobile phones, and the resulting security problems with CDMA network will be cause for concern. In the current 3G standard, wireless terminals and radio network controller have been encrypted and protected. However, the communication information of CDMA mobile phone users is still a clear form of transmission in the CDMA core network, which is vulnerable to illegal attacks such as eavesdropping. Therefore, how to protect the communication information of CDMA mobile phone users is becoming an important research topic. End to end encryption communication is a better solution to protect the CDMA mobile phone users.End to end encryption communication based on the current CDMA communication network is been proposed to protect the CDMA mobile phone users. Taking full account of the needs of CDMA mobile phone users, based on the combination of CDMA communication network and the associated communication protocols, using the two kinds of symmetric and asymmetric cryptographic techniques, a complete end to end encryption communication solutions based on the CDMA communication network is been proposed. In the system, as a core component, a key management center is added to provide authentication for mobile phones, key distribution and other services, which is linked to the short message center. KMC uses ECC asymmetric algorithms and AES symmetric algorithm to achieve the authentication, key distribution. At present, this design concept based on the end to end encrypted communication of CDMA network has been completed. Through the various tests within the laboratory, test results show that the design idea is feasible and the project can't only achieve CDMA network end to end encrypted communication, but also has high efficiency and achieve the desired purpose of academic research and experimentation.
Keywords/Search Tags:CDMA Network, KMC, ECC, AES, End to End Encryption
PDF Full Text Request
Related items