Font Size: a A A

Based On The 3 G Network Voice Messages Transmission Encryption Methods Of Research

Posted on:2013-07-18Degree:MasterType:Thesis
Country:ChinaCandidate:F YinFull Text:PDF
GTID:2248330374986505Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
The2G and2.5G mobile communication system on a global scale,such asGSM/GPRS and CDMA, has achieved great success, and applies popularly and widely.But because of the support of the global roaming, spectrum utilization rate, broadbanddata service and the streaming media service shows some deficiency,the2G and2.5Gmobile communication system is evolving to the third generation mobilecommunication system(3G) with supporting broadband multimedia communication,which is also the inevitable development direction of the public mobile communicationsystem.Although the3G mobile communication using a variety of security technologyto meet the needs of civil mobile communication the basic security requirement.However, there are still some safety issues, can not meet the special communicationfield and personal special security requirement.Given the voice service is the most frequently used means in the specialcommunication field, this paper researchs mainly feasible encrypted voice informationtransmission method of3G netwoks,such as TD-SCDMA,WCDMA and CDMA2000,from three directions.In order to put forward the feasible solutions, this paper alsoperforms the in-depth research from the following several aspects:1) Research three kinds of network architecture,such as TD-SCDMA, WCDMAand CDMA2000, and summarize three kinds of network core network and the radioaccess network common element composition and each element of the basic functionsof. For TD-SCDMA and WCDMA network element basic and same situation, discussthe difference of two kinds of elements in the technology and function. At the same time,from the transmission rate, basic function, technology evolution, deploy state, numberof users and so on several aspects of the comparison of three kinds of network, sum upthe three network in their respective technology and industrialization of the advantagesand disadvantages.2) Analyze of3G network security mechanisms, on which the defects that mayexist, and the defects that may cause harm and loss. In the3G network has been the global commercial background, to find effective solutions to these defects on the specialsecurity requirement threat method.3) Analyze of3G network common voice channel, CS channel and PS channeladvantages and disadvantages, based on the three channel for transmission of encryptedvoice information key technology. According to the technical difficulties are designedbased on three channel for transmission of encrypted voice information plan, at thesame time from the working principle, working process and other aspects of the threescheme feasibility.4) On three kinds of transmission of encrypted voice information plan to organize anational test, summarize the test condition. According to the test condition,analyze ofthree regimens in current3G network advantages and disadvantages, combine with3Gnetwork technology evolution direction of evolution of different stages of3G.
Keywords/Search Tags:encrypted voice, transmit, network architecture, security mechanism
PDF Full Text Request
Related items