Font Size: a A A

Research And Improvement Of3G Network Access Security

Posted on:2013-10-10Degree:MasterType:Thesis
Country:ChinaCandidate:B ChenFull Text:PDF
GTID:2298330467974665Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With mobile communications has continually integrated into the daily lives of people, the development of China’s mobile communication system from2G to3G will be an inevitable trend.Meanwhile, people are increasingly concerned about the security of3G network access security. Therefore, a study on China’s3G network access security in this regard has a very important practical significance.In this paper analysis the security of the3G network architecture, the work focus on the research and improvement of network access security.The specific work of this paper is as follows:Using BAN logic formally proof the two authentication modes:"ask-answer" and "knowledge proof".Analyse the security vulnerabilities in AKA and may be subject to attack. This proposed increase an two-way authentication of VLR Mechanism, besides does not increase the number of communication. By OPNET14.5, simulate model of network, and compare improved agreement with the original agreement in terms of security and efficiency whether there is a better certification function. From an overall perspective, reflect on the current3G network access security.Propose a cryptography based on elliptic curve public key authentication strategy. Based on superiority of elliptic curve cryptography, discuss3G network security Mechanisms with PKI-based system, and focus on process of issueing out the AKA-based user certification and mobile communications certificationbased on public key cryptography. Finally, give a safety analysis.
Keywords/Search Tags:3G, 2G, network access security, 3GAKA, PKI
PDF Full Text Request
Related items