Research and Implementation of End-To-End Security Module in Mobile Communications System |
|
Author | FengSha |
Tutor | YangYiXian |
School | Beijing University of Posts and Telecommunications |
Course | Information Security |
Keywords | Mobile communication system GSM Smart Card End-to-end security Signaling protocol |
CLC | TN929.5 |
Type | Master's thesis |
Year | 2009 |
Downloads | 141 |
Quotes | 3 |
The mobile communication system openness, security issues due to the radio channel has been one of the key factors that affect the operation of the system. Current second-generation GSM system, widely used in China, despite using a valid password security techniques to ensure the safety of the air interface, but still exists in the link and node of the core network devices cleartext message transmitted on the network can easily be eavesdropping. In addition, in our public mobile communications network, the core technology of networking equipment, intellectual property rights to the majority of other countries, equipment backdoor, technical loopholes will give the user privacy pose a serious threat. Therefore, the public mobile network end-to-end security is very necessary and has broad application prospects. The goal is to achieve end-to-end security system of mobile communication network: end-to-end security solutions, developed to provide users with voice, SMS and data with high reliability and safety of the end-to-end security modules, end-to-end dense key management center, registered data server and mobile terminals to support end-to-end encryption function products available to the user information on end-to-end confidentiality, integrity, authentication between users and meet the management requirements of the state of security products . This paper mainly research and implementation of the end-to-end security system security module. The end-to-end security module provides end-to-end encryption and key management functions, is the key and core part of the whole system. The end-to-end security module based on smart card terminal through a smart card reader and cryptographic smart cards to interact. Implementation allows the end-to-end security module is encapsulated in a smart card in a terminal using a different key management, and end-to-end encryption scheme, has significant advantages. The main work of this paper is divided into two main parts: One is to put forward a new mobile communication system, end-to-end security module signaling protocol, a mobile communication system, end-to-end security module in the design and implementation of smart card. The main results of this paper include: proposed a new mobile communication system, end-to-end security module signaling protocol, the full realization of the key management and encryption of the end-to-end security module for mobile communication system call functionality, and a good guarantee of safety, reliability and integrity of all interact with the smart card message. Design and realization of a smart card-based end-to-end security module, the completion of the necessary process of end-to-end encryption key management, voice encrypted communication function, and proposed performance requirements of the end-to-end security smart card as well as the corresponding The function test. In this paper, the design of the end-to-end security smart card has been successfully applied to the GSM system, the end-to-end security system, and successfully achieve the end-to-end voice encryption communication.