Font Size: a A A

Research On Secure Access Methods In LTE Wireless Communication Networks

Posted on:2019-04-29Degree:MasterType:Thesis
Country:ChinaCandidate:X J ZhangFull Text:PDF
GTID:2438330566995906Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the wide range of applications of LTE wireless communication services and more and more types of applications,the enormous challenges of LTE network communication security greatly limit the future development of LTE wireless communication.Encryption is the main means of ensuring the security of wireless network communications,which ensures that users can find a relatively secure communication channel in an insecure channel.Access security is the first line of defense for LTE wireless communications and is a prerequisite for ensuring that both parties to the communications are legitimate.Based on this,this paper applies the encryption system to the system of secure access.Considering the legitimacy of identity between communication users,this paper studies the access security technology from the perspective of identity authentication.The work done in this paper includes:This article applies the encryption system to the security access system.Taking into account the legitimacy of communication user identity,this article from the perspective of authentication authentication access security technology.The work done in this paper includes:(1)Several security access mechanisms of LTE network are briefly introduced.The advantages and disadvantages of the two encryption methods in LTE network are compared and analyzed,and the existing problems in LTE network authentication are analyzed.At the same time,it briefly introduces the preliminary theoretical knowledge and mathematical expression used in this paper,which lays the foundation for the following theoretical research.(2)Study two-party LTE identity authentication protocol based on hybrid encryption.In order to solve the problem of communication security between different users in the LTE communication network,it is usually ensured that the identities of both parties in the communication are legitimate by adopting the authentication protocol before the communication.The authentication protocol should be able to resist replay attacks,delay attacks and other threats,while the authentication process should be as small as possible.In this paper,we propose a certificateless two-party authentication protocol based on bilinear pairing and discrete logarithm problem(DLP),which is computationally intensive and can not resist camouflage attacks in most existing schemes.In the protocol,the base station and the node jointly generate the node key pair to resist the camouflage attack,and use the discrete logarithm problem to generate the session key to reduce the computation in the authentication process.The results of security analysis and performance analysis show that the proposed protocol can effectively reduce the computational burden in the certification process while ensuring the security.(3)Studying LTE roaming group authentication protocol based on certificateless aggregate signature technology.With the wide application of MTC,supporting multiple MTC devices to access the network simultaneously has become an inevitable requirement for LTE network communication.In order to solve the problem of real-time secure and efficient access for multiple MTC devices,this paper proposes a group authentication protocol based on two-wire pair and aggregation signature.In the proposed protocol,in order to resist camouflage attacks,node keys are jointly generated by eNBs and nodes,and session keys are generated based on the DLP(discrete logarithm problem)problem,reducing the computational complexity of the authentication process.Security analysis shows that the proposed protocol can meet the basic security needs and can solve the signaling congestion threat.In addition,the performance evaluation shows that the transmission overhead and computational complexity are lower than the traditional solutions.
Keywords/Search Tags:LTE communication, hybrid encryption, mutual authentication, aggregation signature, group authentication, security
PDF Full Text Request
Related items