Font Size: a A A

The Research Of Authentication Protocol In LTE-R

Posted on:2014-02-17Degree:MasterType:Thesis
Country:ChinaCandidate:Y H FangFull Text:PDF
GTID:2268330401476575Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the continuous improvement of the high-speed railway’s operating-speed, thehigh-speed railway mobile communication system needs to be evolved and promotedsimultaneously. UIC proposes that high-speed railway communication system of GSM-R toevolve to LTE-R directly in the near future, without experiencing the transition of3G.Therefore, how to evolve the LTE-R has become the research focus of many groups andindividuals, in which, security issues of railway mobile communications system is much moreimportant. As the new generation of high-speed railway mobile communication system drawslessons from the security protocols of GSM-R railway communication, searching the way toavoid the potential safety problems of the communication protocol become more urgent.Identity authentication, the first hurdle to protect the security of network, is an importantpart of the whole system security. There are some technical defects in the identityauthentication of present GSM-R, including one-way authentication and session keytransmitting in clear plaintext and so on, in identity authentication of GSM-R. By drawingUMTS authentication and key agreement mechanism, LTE-R will overcome the flaws of theGSM-R on one-way authentication, providing more powerful security mechanism for railwaymobile communication.However, the improved LTE-R AKA inherits the advantages of UMTS, but there are stillmany defects. Firstly, LTE-R’s security mechanisms are based on private key cryptography,which must lead to the difficulties of key management and poor scalability. At the same time,with the continuous expansion and development of the wireless network, key management isbecoming more and more complicated; Secondly, the users must transfer their IMSI in clearplaintext to the network in LTE-R identity authentication and face the risks of attackersattacking to collect users’ IMSI to obtain more information. Thirdly, there is no user’s trust inidentity authentication protocol.This article describes the key technologies introduced in LTE-R system andimplementation effect, analyses its authentication security mechanisms and defects. Based onsome of the deficiencies mentioned above, an access authentication scheme based on theself-certified public key cryptosystem is proposed from the two aspects: the discrimination ofnetwork to users and the certification to mobile terminal. One hand, for the userauthentication, only identity information was registered in Certificate Authority can theyaccess network by their own identity information, obtain network resources. I wrote theinterfaces of registration and certification in C++language in this part; On the other hand,for the certification to mobile terminal according to the different scenes of access, I designedthree authentication strategies including the first certification, re-certification and switching certification to meet the needs of different authentication environments, and I compared withUMTS’ authentication mechanisms in the qualitative and quantitative, from the security andefficiency views.Finally using Java language implements encryption and decryption algorithms,using theMyEclipse platform tests the execution time of the algorithm on a PC. Then analyze of thetest results.
Keywords/Search Tags:LTE-R, Security, Authentication, Self-certified public key cryptosystem
PDF Full Text Request
Related items