Font Size: a A A

Research Of Authentication And Key Management Mechanisms For Trunking Communication System

Posted on:2014-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2248330398971984Subject:Information security
Abstract/Summary:PDF Full Text Request
With the accelerated development of recent domestic and international information technology, the applications of the mobile communication system are increasingly expanding, and the trunking mobile communication system, as a kind of a mobile communication system, is mainly applied in production scheduling and command communications business, widely used in the police, ambulance, public transport and other areas with higher security requirements. However, the trunking mobile communication system security issues are becoming more and more serious, and the open wireless transmission media which the system depends on is vulnerable to interception, interruption, tampering and counterfeiting security threats. Therefore, the security research on trunking mobile communication systems has important practical value.Based on the introduction of trunked mobile communication system and its standards, the paper analyzed the major security threats faced by the trunking mobile communication system and its security needs, focused on some security technologies such as authentication and key management, proposed a mutual authentication protocol for trunking mobile communication system, and analyzed its security, designed and implemented authentication mechanisms and key management scheme of trunking mobile communication system, and verified the availability and performance of the system through the analog terminal and analog base station.The main contents of this paper include the following aspects:1. Based on some features of trunking mobile communication system, such as mainly used in group communication and the limited mobile terminal computing power and storage space, and security threats it facing, the security requirements of the trunked mobile communication system are proposed.2. After analyzing the authentication mechanisms of TETRA systems and GSM systems, an improved mutual authentication protocol is proposed. The authentication center system is also designed and implemented, providing the function of mutually authentication for the terminal and the network system and verifying the availability and performance of the system with the analog terminal and analog base station.3. With the research of the key management scheme of TETRA systems, main functions of a key management system are proposed, focused on the key update mechanisms when the group members joined or left. Also a key management system is designed and implemented and the availability and correctness of the system are verified by analog mobile terminals.
Keywords/Search Tags:Trunking Communication, Authentication Protocol, Key Management, Security
PDF Full Text Request
Related items