Font Size: a A A

Study On Data Encryption Method Based On3G Network Transmission

Posted on:2015-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:H T SunFull Text:PDF
GTID:2298330467453617Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
In today’s mobile communications, the more variety of its business lines, a variety ofemerging mobile applications are gradually emerging, such as mobile shopping, Taobaocommerce. These act as a wireless channel is bound to make a lot of sensitive datatransmission role, therefore there are many challenges in the secure transmission, people’strust comes from the network security and reliability of mobile communications. Based onthis, the security3G systems research is not only of great significance, but also it will playan invaluable role.To ensure the safety of mobile communications, we usually use the following twomethods: the first one is the encryption algorithms; the second one is the authentication andkey agreement protocol. As the core of this two algorithms, the password securitytechnology and non-repudiation services are studied deeply, then a full range of discussionand research on the GSM system security systems is carried out, and the security problemsexisting in the system are revealed, and the targeted solutions for security issues areproposed. On this basis, the latest research in cryptography as a starting point, the encryptionand signature technology based on the ellipse cryptosystem are introduced, finally theimproved AKA protocol is proposed, which resolves to provide a good solution for3Gsystems exposed problems of IMSI. At the same time, the network VLR authentication,security performance of improved AKA protocol, and the insecurity problems ofauthentication vectors are analyzed.In addition, in-depth and widespread discussion of the whole process of encryption andintegrity protection3G system are established. On this basis, the trigger conditions ofauthentication process are designed, the authentication scheme of the network is offered tosolve the problem of the coexistence of2G and3G networks.
Keywords/Search Tags:3G security, Mobile communication, Encryption, Authentication protocol
PDF Full Text Request
Related items