会议专题

Research On An Improved Proposal Of 3G Security

In 3G mobile communications, network security is mainly ensured by the AKA protocol and the complexity of encryption algorithms. After successful operation of AKA protocol, the serving network VLR could corroborate the identity of the user and the user could definite the validity of HLR. If authentication is successful, the corresponding cipher key CK and integrity key IK in the authentication vector shall be taken in use to encrypt data in both the RNC and the ME. This paper described the 3G AKA protocol process and its security features, and made an analysis of the potential security vulnerabilities and possible attacks. To solve these vulnerabilities, the author finally put forward a reliable and effective improved proposal. Finally, an analysis of the improved protocol has been made.

3G AKA Protocol Communication Security

Li Wang Zehua Gao

School of Information and Communication Engineering Key Laboratory of UWC, Ministry of Education, Beijing Univ. of Posts & Telecom (BUPT) Beijing, China

国际会议

2011 International Conference on Electronic & Mechanical Engineering and Information Technology(EMEIT 2011)(2011年机电工程与信息技术国际会议)

哈尔滨

英文

4110-4113

2011-08-12(万方平台首次上网日期,不代表论文的发表时间)