Font Size: a A A

Security Analysis And Research Of LTE Mobile Network Protocols

Posted on:2017-12-28Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiFull Text:PDF
GTID:2348330518995819Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With LTE technology,the representing technology of the 4G mobile communication technology,has been deep in people's work and life,it's security issues are increasingly concerned by people.LTE system in the mobile network protocol security defects have characteristics such as being easy to take advantage of,having a wide range of impact and hard to locate.Therefore,they are often used by criminals in order to damage the LTE system security.When compares the LTE system to the former mobile communication system,we can see the change in the framework is revolutionary.The tasks for each function entity are reallocated.The network protocols than system uses and the functions that the protocol achieves have changed dramatically.This brings new challenges and difficulties to our research work.Therefore,this paper analyzes and studies the security of mobile network protocol in LTE system by formal analysis.The main research contents are as follows:First,in order to solve the model checking method state space explosion problem,the paper analyses the preliminary safety of LTE network protocol using the attack tree mode method and the safety factor analysis method.And conduct a feasibility analysis of the attack sequence after the initial attack.Then an in-depth analyze of the security flaws in most feasible attack sequence corresponding to the protocol are given,though which concludes the flaws that may exist in the process of access and handover of security.The results of the analyzes can help us locate the possible security flaws in the protocol process more effectively,thusly improve the efficiency of our work.Then,based on the study of colored Petri net and its analysis methods and tools,I construct the model of the possible security flaws in the protocol process using colored Petri nets.And through reverse state of colored Petri net analysis method and colored Petri nets analysis tool,I verify the security flaws of the protocol process.
Keywords/Search Tags:LTE, security, attack tree model, safety factor analysis, colored Petri net
PDF Full Text Request
Related items