首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
The logic ruling the user and network authentication as well as the data ciphering in the GSM architecture is characterized, regarding the transferring of the parameters employed in these processes, by transactions between three nodes of the system, that is the MS, actually the SIM, the visited MSC/VLR, and the AuC, which is attached to the HLR in most cases. The GPRS and the UMTS architecture carry the heritage of the GSM's philosophy regarding the user/network authentication and the data ciphering. So, the corresponding three nodes (MS, VLR, and HLR) of these systems are involved as well in the authentication and data ciphering procedures. Moreover, the methods of the conventional cryptography have been adopted by all three systems. This paper describes in brief the subscriber authentication and data ciphering, as they are recommended by the Specifications for all three aforementioned systems. Based on what the specifications define, we pinpoint the vulnerable points of the systems, exposed to third party attacks, and propose asymmetric cryptography procedures for their coverage, consisting of the introduction of public–private key pairs for the transactions between the VLR-HLR, as well as the MS-VLR. On the other hand, the nature of the services constituting a Public Key Infrastructure (PKI) renders the telecommunication operators the main candidates for the development of PKIs fully or partially fledged. The private–public key pair, stored by the PLMN operator in the SIM, for the GSM/GPRS case, or in the USIM for the UMTS case and created to deal initially with internal system functions, can easily be extended, adopted and employed in secure e/m-transactions, if bound to a digital certificate, in the case the PLMN operator supports PKI services as well.  相似文献   

2.
借助存量GSM/TD-SCDMA用户,保证GSM/TD-SCMDA和TD-LTE网络业务的一致性和连续性,是TDLTE网络建设的主要原则之一。本文首先理论介绍3GPP定义USIM卡在GSM/TD-SCDMA融合网络中鉴权与加密关键技术和TD-LTE的鉴权与加密原则,其次讨论USIM卡在GSM/TD-SCDMA/TD-LTE网络中互操作时的鉴权与加密需求,最后提出利用UDC HLR解决方案建设GSM/TD-SCDMA/TD-LTE融合用户数据库解决USIM卡在GSM/TD-SCDMA/TD-LTE互操作时的接入网安全问题。  相似文献   

3.
To offer wireless data access services that are more efficient than GPRS or UMTS networks, public WLANs are in a predominant position to embrace the wireless broadband era. Reusing the existing mechanisms for user authentication, access control, billing, and roaming handling procedures in mobile territory to construct a complementary network, public WLAN (PWLAN) has drawn the attention of cellular operators such as Vodafone and T-Mobile. In this article we aim to investigate a practical end-to-end PWLAN architecture capable of using GPRS/UMTS SIM-based authentication for current mobile users and carrying out Web-based authentication for occasional users without SIM modules simultaneously. Additionally, we consider a confederation of various PWLAN service providers by a RADIUS-based roaming mechanism to leverage the existing resources of cellular operators. The proposed considerations and guidelines provide a baseline skeleton to build an extendable environment and successfully construct a flexible cellular/PWLAN hotspot in mobeeLAN service.  相似文献   

4.
UMTS鉴权原理及其与GSM鉴权兼容性   总被引:1,自引:0,他引:1  
介绍了第三代移动通讯系统UMTS的安全体系,重点介绍UMTS的鉴权流程,鉴权原理和相关算法,并且对UMTS和GSM的鉴权兼容性进行了探讨。  相似文献   

5.
借助存量GSM\TD-SCDMA用户,保证GSM\TD-SCMDA和TD-LTE网络业务的一致性和连续性,是TD-LTE网络建设的主要原则之一。本文首先理论介绍3GPP定义USIM卡在GSM\TD-SCDMA融合网络中鉴权与加密关键技术和TD-LTE的鉴权与加密原则,其次讨论USIM卡在GSM\TD-SCDMA\TD-LTE网络中互操作时的鉴权与加密需求,最后提出利用UDC HLR解决方案建设GSM\TD-SCMDA\TD-LTE融合用户数据库解决USIM卡在GSM\TD-SCDMA\TD-LTE互操作时的接入网安全问题。  相似文献   

6.
The Universal Mobile Telecommunication Standard (UMTS) is continuously evolving to meet the increasing demand of modern mobile and Internet applications for high capacity and advanced features in security and quality of service. Although admittedly enhanced in terms of security as compared to GSM (2G) systems, UMTS still has some weaknesses that may often lead to several security incidents. In this article, we come up with a novel authentication mechanism based on the one-time-secret security capabilities, which can assure an expeditious mobile communication environment and simultaneously be able to deal with the several issues related to security vulnerabilities (Redirection Attack, Man-in-the-Middle-Attack) and others like the excessive bandwidth consumption, storage overhead in VLR etc. existing in the current mobile communication (UMTS). In addition, here we also introduce a new concept called “Neighborhood Policy”, where several VLRs can form groups among themselves and carry out significant responsibilities in order to authenticate a User without interfering HLRs even though the User moves to a new VLR (belongs to the same group). We argue that the proposed solution not only achieves the mutual authentication in a secure manner, but at the same time, it also greatly reduces the computation and communication cost of the mobile User as compared to the existing state of the art authentication schemes.  相似文献   

7.
Recent years, the mobile technology has experienced a great increment in the number of its users. The GSM’s architecture provides different security features like authentication, data/signaling confidentiality and secrecy of user yet the channel is susceptible to replay and interleaved. It always remains relevant as it is important in all types of application. Global system for mobile (GSM) communications has become the most popular standard for digital cellular communication. The GSM security system depends on encryption, authentication algorithms and information from SIM card. In this research paper, we proposed the design and implementation of a new authentication scheme by using certificate-less public key cryptography (CL-PKC) over the GSM system was attempted to miss some system detail. This research paper, we also proposed the GSM system and its security and public key cryptography with a focus in the CL-PKC; the CL-PKC is a simple, useful and robust security scheme designed and implemented over GSM. Our approach is more efficient than other competing topologies. We solved the GSM problem in A3 algorithm such as eavesdropping and this problem solved by CL-PKC because of its robustness against this type of attack by providing mutual authentication make the system more secure.  相似文献   

8.
The standards for the universal mobile telecommunications system (UMTS) are being developed by the European Telecommunications Standardization Institute (ETSI), UMTS is a set of standards aimed at the global market. It will be a real third-generation global system for mobile communications, adding new features and introducing relevant technological innovations while evolving from both a global system for mobile communications (GSM) and integrated services digital networks (ISDNs), UMTS standardization is a market-driven process, and UMT standards are based on the carefully selected market requirements developed in close cooperation with the UMTS Forum and GSM Memorandum of Understanding Association (MoU), UMTS belongs to the IMT-2000 family and, while supporting existing services, will be capable of offering new and revolutionary services including multimedia and access to the Internet, offering a speed of 2 Mb/s for a single user at a radio-access network. This paper attempts to give an objective view of the UMTS standardization in Europe  相似文献   

9.
以毛里求斯MTML Ⅰ,Ⅱ期为例,介绍面向GSM/UMTS技术的移动通信综合方案。首先较为系统地就MTMLGSM/UMTS全网综合解决方案中涉及到的网络规划、微波传输规划等进行了讨论。之后就GSM/UMTS移动通信系统综合解决方案中,涉及到各专业产品技术方案与网络架构等,进行了较为详细地展开阐述。  相似文献   

10.
UMTS security     
The Universal Mobile Telecommunications System (UMTS) is one of the new 'third generation' mobile cellular communication systems. UMTS builds on the success of the 'second generation' GSM system. One of the factors in the success of GSM has been its security features. New services introduced in UMTS require new security features to protect them. In addition, certain real and perceived shortcomings of GSM security need to be addressed in UMTS. This paper surveys the major security features that are included in the first releases of the UMTS standards.  相似文献   

11.
本文对鉴权原理和流程进行了详细描述,同时针对2G/3G互操作场景下的鉴权进行了测试和分析,结合目前网络现状和华为设备的参数设置提出了优化思路。  相似文献   

12.
An overview of the radiated power by a UMTS mobile phone in everyday usage is given. Compared to GSM, the exposure is presently about a thousandfold lower in comparable situations. Both location and time dependence as well as the control of the output power have been investigated using operating networks in Germany.  相似文献   

13.
随着移动通信的发展,通信网络中安全问题也日益严重。LTE与UMTS和GSM一同提供了一种相似的安全性。本文首先介绍了安全性中的认证和密钥协商进程,然后对LTE系统中的密钥产生体系和使用流程进行了分析,着重对接人层的安全模式命令进行阐述,最后总结了LTE中两大安全性功能的实现方案。  相似文献   

14.
A simple and computationally inexpensive analytical approach is proposed for the evaluation of the dependence of short-term fading depth on system bandwidth and environmental characteristics. The approach, accounting for the maximum difference in propagation path length and having the Rice factor as a parameter, is derived by fitting simulated data from a model in the literature. Application examples are presented for GSM, UMTS, HIPERLAN, and mobile broadband systems (MBS), giving some insight into the fading depth observed under different conditions with regard to system bandwidth and environmental characteristics. Macro-, micro-, and picocell environments are considered. In the microcellular environment, the fading depth experienced by UMTS is below the one for GSM by 0.1 to 5.5 dB, while in the picocellular one, the difference between GSM and UMTS is not significant, being almost independent of environment characteristics. When considering HIPERLAN or systems with larger bandwidths, the fading depth, both in micro and picocellular environments, is smaller than the one verified by UMTS; however, there is an increased dependence on environmental characteristics. In the macrocellular environment, the fading depth experienced by UMTS is about 6 to 11 dB below the one for GSM. Hence, different short-term fading margins should be considered for each system and working environment.  相似文献   

15.
Different user segments have various requirements and expectations towards the performance of mobile networks. Subscribers having experienced the high quality of UMTS networks desire to maintain high speech quality and excellent data throughput also in areas of missing UMTS but existing GSM coverage. In GSM networks a privileged treatment of UMTS subscribers by means of proper resource allocation provides a substantial quality improvement with respect to standard GSM subscribers. This strategy allows network operators to reduce the performance gap between both network areas experienced by UMTS subscribers. A detailed study on the performance of circuit switched speech and packet data services has been performed based on system level simulations. The results show significant speech quality advantages for users with dual-RAT terminals compared to standard GSM users as well as notably higher data throughput rates.  相似文献   

16.
徐恩  张建国 《移动通信》2013,(22):62-65
针对某运营商EGRPS网络在农村面对的困境和该运营商GSM900技术向UMTS900技术或LTE技术演进的必要性,分析7GSM900技术向UMTS900技术或LTE技术演进的频率规划,最后从覆盖、容量和网络改造三个方面分析了该运营商GSM900技术向UMTS900技术或LTE技术演进对现有GSM900网络影响。UMTS900和LTE允许的下行最大路径损耗比GSM900语音业务允许的最大路径损耗大3~4dB,部署UMTS900或者LTE系统后,可以提供的下行数据吞吐量是原有GSM900系统的4.38—20.18倍。  相似文献   

17.
With the advent of IP technologies and the tremendous growth in data traffic, the wireless industry is evolving its core networks toward IP technology. Enabling wireless Internet access is one of the upcoming challenges for mobile radio network operators. The General Packet Radio Service is the packet-switched extension of GSM and was developed to facilitate access to IP-based services better than existing circuit-switched services provided by GSM. We illustrate how a visited mobile subscriber on a GPRS/UMTS network can access his/her home network via the gateway GPRS support node (GGSN). We also propose some implementation ideas on wireless Internet access for a remote mobile subscriber based on a GPRS/UMTS network  相似文献   

18.
This paper outlines the path from developing broadband ISDN/ATM systems towards the European vision of the next generation mobile system — Universal Mobile Telecommunications System (UMTS).The capabilities of UMTS in terms of services and features compared to the second generation mobile system GSM, and the network technologies behind N-ISDN and B-ISDN, are discussed with proposals for technical developments to satisfy the UMTS requirements. The UMTS radio interface aspects are described and considerations on the network requirements to support these radio aspects are discussed.The requirements within the network for control, switching and transport to support the mobility, service and interconnecting network aspects of UMTS are outlined in conjunction with the technical solutions currently under discussion and some latest thoughts on a potential high-level architecture  相似文献   

19.
As great progress has been made in mobile communications, many related researches on this topic have been proposed. In most of the proposed protocols so far, it has been assumed that the person using the mobile station is the registrar of the SIM card; as a matter of, the previous protocols for authentication and session key distribution are built upon this assumption. This way, the mobile user can only verify the identity of the owner of the SIM card. This means that the mobile user can only know that who registers the SIM card with which he communicates. Note that the human voice can be forged. To make sure that the speaker at the other end is the right owner of the SIM card, concept of the password is involved to construct the end-to-end security authentication protocol. In the proposed protocol, each mobile user can choose a password. When two mobile users want to communicate with each other, either user can request to perform a end-user identification process. Only when both of the end users input the correct passwords can the correct common session key be established.  相似文献   

20.
Reconfigurable Multiband Antenna Designs for Wireless Communication Devices   总被引:1,自引:0,他引:1  
New designs for compact reconfigurable antennas are introduced for mobile communication devices. The uniqueness of the antenna designs are that they allow various groups of their operating frequency bands to be selected electronically. In particular, each group of frequency bands, or mode, can be made to serve several different communication systems simultaneously. These systems may include various combinations of GSM, DCS, PCS, UMTS, Bluetooth, and wireless local-area network (LAN). Therefore, by electronically selecting different antenna modes, a variety of communication systems can be conveniently served by only one antenna. One advantage is that through the different operational modes, the total antenna volume can be reused, and therefore the overall antenna can be made compact. In these designs, the selection of the different modes is achieved by either i) switching different feeding locations of the antenna (switched feed) or ii) switching or breaking of the antenna's connection to the ground (switched ground). This paper demonstrates these two designs. For the first design of switched feed, it can support GSM, DCS, PCS, and UMTS. In the second design, the antenna makes use of a switched-ground technique, which can cover GSM, DCS, PCS, UMTS, Bluetooth, and 2.4 GHz wireless LAN. The designs are investigated when ideal switches and also various realistic active switches based on PIN diodes, GaAs field effect transistor, and MEMs configurations. The designs are verified through both numerical simulations and measurement of an experimental prototype. The results confirm good performance of the two multiband reconfigurable antenna designs.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号