Font Size: a A A

Research And Implementation On Authentication Encryption Process Of TD-SCDMA Femto HNB

Posted on:2012-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z J LinFull Text:PDF
GTID:2218330371452297Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
TD-SCDMA is an international mobile communications standard which is proposed by China and accepted by ITU. It is one of the mainstream third generation mobile communication technologies. And femto is known as femto cell, which is a small, low-power cellular base station, mainly for home or business office and other indoor spaces. We also call it home base station (HNB, Home NodeB). It is mainly used as a supplement of indoor cellular coverage, which provides voice and data services for the indoor users and ensure the effect of wireless coverage indoor.In the TD-SCDMA Femto communication systems, in order to ensure the safety of communication services, the core network need to authenticate the identity of the Femto base station before the transport business; and the network side (based on IP transport) between the base station and the gateway through establishing a secure tunnel to ensure data security and integrity.IKE (Internet Key Exchange) is an internet key exchange protocol, it's the default key exchange protocol for IPSec (Internet security protocol standard), its main function is to complete the negotiation of SA (Security Association), namely to complete the negotiation data encryption algorithm and the integrity protection algorithm. When the IKE interaction is completed, you can use the results of the consultation to establish IPSec protection, and to realize the security protection for data transmission.In this paper, on the VxWorks operating system, we use IKEv2 (IKE version 2) protocol to establish the safety tunnel of the base station's network side, combined with pre shared key authentication or EAP-AKA authentication mode to complete the base station's identity authentication. At the same time through repeat IKE consultations to achieve security tunnel safety information update, and ensure the reliability of the safe tunnel.
Keywords/Search Tags:FEMTO, IPSec, IKEv2, EAP-AKA
PDF Full Text Request
Related items