Research On An Improved Proposal Of 3G Security
In 3G mobile communications, network security is mainly ensured by the AKA protocol and the complexity of encryption algorithms. After successful operation of AKA protocol, the serving network VLR could corroborate the identity of the user and the user could definite the validity of HLR. If authentication is successful, the corresponding cipher key CK and integrity key IK in the authentication vector shall be taken in use to encrypt data in both the RNC and the ME. This paper described the 3G AKA protocol process and its security features, and made an analysis of the potential security vulnerabilities and possible attacks. To solve these vulnerabilities, the author finally put forward a reliable and effective improved proposal. Finally, an analysis of the improved protocol has been made.
3G AKA Protocol Communication Security
Li Wang Zehua Gao
School of Information and Communication Engineering Key Laboratory of UWC, Ministry of Education, Beijing Univ. of Posts & Telecom (BUPT) Beijing, China
国际会议
哈尔滨
英文
4110-4113
2011-08-12(万方平台首次上网日期,不代表论文的发表时间)