Font Size: a A A

Research On Application Of Chaos In3G Security

Posted on:2013-07-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y F LiuFull Text:PDF
GTID:2248330395956686Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
The security of the third generation mobile communication system gets people’sregard and attention. There will be many new and different providers of services such ascontent providers, data service providers and so on. The terminal will be used as aplatform for e-commerce and other applications,in which some sensitive informationsuch as user identity, PIN, etc. They may be transmitted through wireless networks. Ifthe information mentioned above is leaked, then it will cause user’s loss. As a result,this paper focuses on network access security mechanism of3G security.The paper summarize the3G security system and analyze the network accesssecure mechanism. User identity authentication, AKA authentication, data encryptionand integrity are discussed deeply, analyzing the existing security system’s defects.Based on these, I find international mobile subscriber identification number (IMSI)exist security threats, IMSI carrying user’s identity information, position informationand business information, once they are leaked, it will give users a great deal of trouble,so we must guarantee the safety of IMSI. It combing with the chaos system which hasunique advantages including sensitive dependence on initial conditions, counterfeitstochastic, etc. Applying it to3G system, it can improve encryption, security androbustness of3G. I advance the IMSI encryption scheme based on the Logistic mapping,and carry on the theoretical analysis and experimental demonstration. At last of thispaper put forward the application scene of the scheme, which will be applied to civildefense networking.
Keywords/Search Tags:3G security system, Chaos system, Logistic mapping, IMSI, Civil defense network
PDF Full Text Request
Related items