Font Size: a A A

Researches On Cryptographic Authentication Of TD-LTE Based Trunking Radio Systems

Posted on:2015-11-16Degree:MasterType:Thesis
Country:ChinaCandidate:W H CuiFull Text:PDF
GTID:2308330479989929Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
As the rapid development of Chinese urbanization, the capabilities of management in public affairs as well as the requirements for emergencies processing are becoming more and more important. Therefore, the establishment of a dedicated digital trunking network can benefit the public utilities. Digital trunking radio systems based on TD-LTE are attractive due to its large bandwidth, versatile services and huge system capacity, etc. However, the existing authentication encryption strategies in TD-LTE systems do not meet the requirements of trunking radio systems. Therefore, we focus on the security issues in the TD-LTE based trunking systems in this paper.In this paper, we investigate the authentication and cryptographic algorithms in TD-LTE based trunking radio systems including one-way authentication and mutual authentication process, as well as mechanisms for key derivations in the authentication process. We also compare the performance of cryptographic algorithms. In order to meet the high standards of network security in trunking systems, we apply ZUC into the key derivation as well as EEA3 and EIA3. We apply algorithm proposed in key derivation increase four kinds of encryption algorithms comparing with public network system, also the calculated consumption of trunking radio system increase 69% than public network system. Directly connected mode in off-grid is also an important scenario in trunking systems. Due to the cryptographic authentication mechanism couldn’t be used in the directly connected mode in off-grid, we propose a kind of authentication mechanism to satisfy the demand of communication safety.Generally we work on authentication and encryption algorithms in TD-LTE based trunking radio systems in this paper. The results in our paper will benefit the security analysis and improvement in this special system, and can be applied as the guidance of practical system applications.
Keywords/Search Tags:TD-LTE, trunking, authentication, ZUC algorithm
PDF Full Text Request
Related items