Font Size: a A A

Design And Realization Of Security Feature Of LTE Access Layer

Posted on:2015-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:C ChengFull Text:PDF
GTID:2308330482972711Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of wireless communication technology becoming more mature, people are not satisfied just making phone calls in a mobile situation, and they also want to experience a variety of multimedia network services in mobile condition. So the organization of 3GPP has put forward the 4G wireless communication system with higher speed, larger bandwidth, higher quality of service and lower delay——LTE, Long Time Evolution.Since the appearance of the wireless communication technology that can meet the people’s demand for multimedia network services, it has promoted the development of large amount of data and highly confidential services, such as e-commerce trade, mobile phone online payment, mobile phone banking services, stock trading. If the information of business is not dealed with encryption process and transmitted in the wireless link directly, it may be eavesdropped and maliciously tampered by illegal users. This will cause a great loss to the legal users and operators. Therefore, in the global commercial tendency of LTE, the research on LTE system’s security is very significant.This paper simplely describes the wireless access network architecture of the LTE system, the flat design of LTE makes its security architecture divide into non access layer and access layer security. Then it introduces the key system and security algorithm of LTE. After that, it discusses the security mechanism based on temporary identity and authentication in LTE networks and the process of UE security access to the LTE network is analyzedThis paper’s major research is to realize the security of access layer, it contains the access layer signal’s integrity protection and encryption and the user plane data encryption. Considering the synchronous processing’s negative impact on system, in this project we choose the implementation scheme of asynchronous. And the paper introduces the design of security function module PDCP and Sec Engine in detail, and designs the security process of the packets. Finally we make the system testing for the whole design. The result shows that the access layer can do the integrity protection and encryption process, and the throughput is very close to the system’s theoretical peak. So we achieve the desired results.
Keywords/Search Tags:LTE network, Access layer security, Asynchronous, Integrity protection, encryption
PDF Full Text Request
Related items