首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
借助存量GSM\TD-SCDMA用户,保证GSM\TD-SCMDA和TD-LTE网络业务的一致性和连续性,是TD-LTE网络建设的主要原则之一。本文首先理论介绍3GPP定义USIM卡在GSM\TD-SCDMA融合网络中鉴权与加密关键技术和TD-LTE的鉴权与加密原则,其次讨论USIM卡在GSM\TD-SCDMA\TD-LTE网络中互操作时的鉴权与加密需求,最后提出利用UDC HLR解决方案建设GSM\TD-SCMDA\TD-LTE融合用户数据库解决USIM卡在GSM\TD-SCDMA\TD-LTE互操作时的接入网安全问题。  相似文献   

2.
借助存量GSM/TD-SCDMA用户,保证GSM/TD-SCMDA和TD-LTE网络业务的一致性和连续性,是TDLTE网络建设的主要原则之一。本文首先理论介绍3GPP定义USIM卡在GSM/TD-SCDMA融合网络中鉴权与加密关键技术和TD-LTE的鉴权与加密原则,其次讨论USIM卡在GSM/TD-SCDMA/TD-LTE网络中互操作时的鉴权与加密需求,最后提出利用UDC HLR解决方案建设GSM/TD-SCDMA/TD-LTE融合用户数据库解决USIM卡在GSM/TD-SCDMA/TD-LTE互操作时的接入网安全问题。  相似文献   

3.
随着移动通信的发展,通信网络中安全问题也日益严重。LTE与UMTS和GSM一同提供了一种相似的安全性。本文首先介绍了安全性中的认证和密钥协商进程,然后对LTE系统中的密钥产生体系和使用流程进行了分析,着重对接人层的安全模式命令进行阐述,最后总结了LTE中两大安全性功能的实现方案。  相似文献   

4.
The Universal Mobile Telecommunication Standard (UMTS) is continuously evolving to meet the increasing demand of modern mobile and Internet applications for high capacity and advanced features in security and quality of service. Although admittedly enhanced in terms of security as compared to GSM (2G) systems, UMTS still has some weaknesses that may often lead to several security incidents. In this article, we come up with a novel authentication mechanism based on the one-time-secret security capabilities, which can assure an expeditious mobile communication environment and simultaneously be able to deal with the several issues related to security vulnerabilities (Redirection Attack, Man-in-the-Middle-Attack) and others like the excessive bandwidth consumption, storage overhead in VLR etc. existing in the current mobile communication (UMTS). In addition, here we also introduce a new concept called “Neighborhood Policy”, where several VLRs can form groups among themselves and carry out significant responsibilities in order to authenticate a User without interfering HLRs even though the User moves to a new VLR (belongs to the same group). We argue that the proposed solution not only achieves the mutual authentication in a secure manner, but at the same time, it also greatly reduces the computation and communication cost of the mobile User as compared to the existing state of the art authentication schemes.  相似文献   

5.
The standards for the universal mobile telecommunications system (UMTS) are being developed by the European Telecommunications Standardization Institute (ETSI), UMTS is a set of standards aimed at the global market. It will be a real third-generation global system for mobile communications, adding new features and introducing relevant technological innovations while evolving from both a global system for mobile communications (GSM) and integrated services digital networks (ISDNs), UMTS standardization is a market-driven process, and UMT standards are based on the carefully selected market requirements developed in close cooperation with the UMTS Forum and GSM Memorandum of Understanding Association (MoU), UMTS belongs to the IMT-2000 family and, while supporting existing services, will be capable of offering new and revolutionary services including multimedia and access to the Internet, offering a speed of 2 Mb/s for a single user at a radio-access network. This paper attempts to give an objective view of the UMTS standardization in Europe  相似文献   

6.
WCDMA核心网及其演进   总被引:1,自引:0,他引:1  
本首先介绍了GSM向UMTS演进的必然性,然后介绍了业务如何向UMTS演进,UMTS的标难化进展,最后介绍了现有的2G网络如何向WCDMA过渡。  相似文献   

7.
首先介绍了UMTS中的几种切换类型,然后就UMTS分组域到GSM/GPRS系统间切换(SGSN间),GSM/GPRS到UMTS分组域系统间切换(SGSN间),UMTS分组域到GSM/GPRS系统间切换(SGSN内),GSM/GPRS到UMTS分组域系统间切换(SGSN内)这4种切换过程中的数据缓存与转移的实现过程进行了详细论述,并进行了进一步深入的分析与比较,最后指出其优缺点。  相似文献   

8.
Universal mobile telecommunication system (UMTS) has specified security mechanisms with extra features compared to the security mechanisms of previous mobile communication systems (GSM, DECT). A hardware implementation of the UMTS security mechanism is presented in this paper. The proposed VLSI system supports the Authentication and Key Agreement procedure (AKA), the data confidentiality procedure, and the integrity protection procedure. The AKA procedure is based on RIJNDAEL Block Cipher. An efficient RIJNDAEL architecture is proposed in order to minimize the usage of hardware resources. The proposed implementation performs the AKA procedure within 76 µs comparing with the 500 ms that UMTS specifies. The data confidentiality and the integrity protection is based on KASUMI Block Cipher. The proposed KASUMI architecture reduces the hardware resources and power consumption. It uses feedback logic and positive‐negative edge‐triggered pipeline in order to make the critical path shorter, without increasing the execution latency. The S‐BOXes that are used from RIJNDAEL and KASUMI block ciphers have been implemented with combinational logic as well as with ROM blocks. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

9.
徐恩  张建国 《移动通信》2013,(22):62-65
针对某运营商EGRPS网络在农村面对的困境和该运营商GSM900技术向UMTS900技术或LTE技术演进的必要性,分析7GSM900技术向UMTS900技术或LTE技术演进的频率规划,最后从覆盖、容量和网络改造三个方面分析了该运营商GSM900技术向UMTS900技术或LTE技术演进对现有GSM900网络影响。UMTS900和LTE允许的下行最大路径损耗比GSM900语音业务允许的最大路径损耗大3~4dB,部署UMTS900或者LTE系统后,可以提供的下行数据吞吐量是原有GSM900系统的4.38—20.18倍。  相似文献   

10.
UMTS鉴权原理及其与GSM鉴权兼容性   总被引:1,自引:0,他引:1  
介绍了第三代移动通讯系统UMTS的安全体系,重点介绍UMTS的鉴权流程,鉴权原理和相关算法,并且对UMTS和GSM的鉴权兼容性进行了探讨。  相似文献   

11.
Die Vision UMTS     
The Universal Mobile Telecommunications System UMTS is the European vision of a 3rd generation mobile telecommunications system. UMTS will carry on the world-wide success of the European 2nd generation system, GSM, which now (in February 1998) has 66 million subscribers and 239 operators. The evolution towards UMTS will show both: On the one hand a new air interface will allow multiple users to communicate with several media simultaneously, i.e. transmitting and receiving voice, data, text, images, audio and video at a maximum data rate of 2 Mbit/s. On the other hand enhanced, intelligent networks will support the mobility of users with UMTS-, GSM- and cordless phones. UMTS will be a major contribution to the convergence of telecommunications, broadcasts and computers, setting a milestone on our way towards a global information society.  相似文献   

12.
以毛里求斯MTML Ⅰ,Ⅱ期为例,介绍面向GSM/UMTS技术的移动通信综合方案。首先较为系统地就MTMLGSM/UMTS全网综合解决方案中涉及到的网络规划、微波传输规划等进行了讨论。之后就GSM/UMTS移动通信系统综合解决方案中,涉及到各专业产品技术方案与网络架构等,进行了较为详细地展开阐述。  相似文献   

13.
通过搭建UMTS900M实验网,分别从理论分析、话务分析、实地测试、参数调整及后期优化等方面,研究了引入UMTS900系统对原有GSM900系统的影响。研究结果表明UMTS900的引入对原有GSM900网络影响有限,其业务服务质量未出现明显下降和大的波动,这为后续UMTS900大规模的建设、开通积累了经验。  相似文献   

14.
Different user segments have various requirements and expectations towards the performance of mobile networks. Subscribers having experienced the high quality of UMTS networks desire to maintain high speech quality and excellent data throughput also in areas of missing UMTS but existing GSM coverage. In GSM networks a privileged treatment of UMTS subscribers by means of proper resource allocation provides a substantial quality improvement with respect to standard GSM subscribers. This strategy allows network operators to reduce the performance gap between both network areas experienced by UMTS subscribers. A detailed study on the performance of circuit switched speech and packet data services has been performed based on system level simulations. The results show significant speech quality advantages for users with dual-RAT terminals compared to standard GSM users as well as notably higher data throughput rates.  相似文献   

15.
This paper outlines the path from developing broadband ISDN/ATM systems towards the European vision of the next generation mobile system — Universal Mobile Telecommunications System (UMTS).The capabilities of UMTS in terms of services and features compared to the second generation mobile system GSM, and the network technologies behind N-ISDN and B-ISDN, are discussed with proposals for technical developments to satisfy the UMTS requirements. The UMTS radio interface aspects are described and considerations on the network requirements to support these radio aspects are discussed.The requirements within the network for control, switching and transport to support the mobility, service and interconnecting network aspects of UMTS are outlined in conjunction with the technical solutions currently under discussion and some latest thoughts on a potential high-level architecture  相似文献   

16.
The definition of the `third generation' Universal Mobile Telecommunication System (UMTS) is currently in progress. The UMTS will consist of both terrestrial and space components. The satellite component is expected to operate alongside that of the terrestrial component and provide a complementary rather than a competitive service. First, the role of the satellite component of the UMTS is established, from which potential different satellite-UMTS user groups are identified. The number of users for each user group is then derived, taking into account the gross potential market, the penetration rate of the identified services and the profitability of providing such services via satellite  相似文献   

17.
Mobile systems are evolving into data centric, packet switched,multiacess networks. New types of security threats are emerging in thesenew networks. From the user point of view a seamless solution for thesethreats is required. This paper presents a vision of network convergenceand its implications to authentication and authorization solutions.Security requirements are discussed and current authentication solutionsin GSM, UMTS and operator wireless local area networks (OWLAN) areintroduced. All-IP multimedia session security is discussed.Implications of AdHoc network architecture into security requirement arediscussed.  相似文献   

18.
This paper traces the history of location-based service (LBS) standards that arose from North American requirements in the work on GSM standards in the late 1990s. It also describes how interest in GSM/UMTS outside Europe led to the creation of the Third Generation Partnership Project (3GPP) for developing UMTS standards (which include standards for the 3G mobile Internet). In addition, the paper covers the role of other standards bodies and interest groups involved in the creation of LBS standards such as the new Open Mobile Alliance.Different location methods for detecting the position of mobiles are described and a summary of the current work in 3GPP on LBS-based services and architecture for UMTS is given. The paper also covers work on wireless access protocols in the old WAP Forum  相似文献   

19.
The convergence of voice, data, and video networks is creating a new environment for telecommunications. In response to the changes, telecommunications equipment manufacturers and service providers are competing fiercely to bring an optimum solution to customers. The evolution of GSM to GPRS and to UMTS is a cellular wireless industry endeavour to meet this demand. This evolution will see the core wireless network infrastructure change from circuit-switched to packet-switched where voice and data are transported using IP as the common protocol. However, this poses a number of challenges, one of which is how to run the key mobile application part signaling protocols over IP. MAP defines the application protocols between switches and databases (e.g., MSC, VLR, SGSN, HLR) for supporting mobility management, security management, radio resource management, and mobile equipment management. UMTS supports both circuit-switched and packet-switched services  相似文献   

20.
This paper investigates the fraudulent usage of mobile telecommunications services due to cloned subscriber identity modules (SIMs). In GSM or the Universal Mobile Telecommunication System (UMTS), a mobile phone or mobile station uses its SIM to gain network access through authentication. If the SIM of a legal user is cloned, then the cloned SIM can be used for GSM/UMTS authentication and fraudulent usage may occur. Under the existing GSM/UMTS mobility management and call setup procedures, we show how quickly the fraudulent usage can be detected. We also propose a simple solution to speed up the detection of potential fraudulent usage.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号