期刊文献+

TD-SCDMA通信网络安全中的AKA机制研究 被引量:2

AKA Mechanisms in TD-SCDMA Network Security
原文传递
导出
摘要 文章从公用3G移动通信系统的安全需求入手,参照信息系统的安全保密体系原理,通过对公众TD-SCDMA网络的安全保密体系进行分析,阐述了TD-SCDMA系统安全模式建立的过程,针对其中的重点环节即AKA的具体流程、实现及异常处理进行了全面的分析,并指出了它存在的问题和解决思路。 This paper analyses the security hierarchy of 3G mobile communication system based on the security demand for 3G mobile communication system and in the light of the principle for security hierarchy in information system. It also discribes the set-up process of TD-SCDMA securitymode. And the key parts, that is, the concrete procedure, implementation and abnormal reaction of authentication and key agreement (AKA) are adequately analyzed. Finally, the problems and solutions of these problems are pointed out.
机构地区 重庆通信学院
出处 《通信技术》 2008年第4期62-64,共3页 Communications Technology
基金 国家自然科学基金资助课题(60672158)
关键词 时分同步码分多址接入通信网络 安全模式 鉴权与密钥认证 TD-SCDMA network security mode AKA(Authentication and Key Agreement)
  • 相关文献

参考文献3

二级参考文献13

  • 1林德敬,林柏钢,林德清.3G系统全网安全体制的探讨与分析[J].中兴通讯技术,2003,9(2):41-45. 被引量:3
  • 23GPP TS 35.205 version 5.0.0-2002, Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions, f1, f1*, f2, f3, f4, f5 and f5*, document 1: algorithm specification(Release 5)[S].
  • 33GPP TS 35.202 version 5.0.0-2002, Specification of 3GPP confidentiality and integrity algorithm, document 2: KASUMI specification(Release 5)[S].
  • 43G TS 33.105 version 3.8.0-2001,3G Security Cryptographic Algorithm Requirements[S].
  • 53G TR 33.901 version 3.0.0-2001,3G Security Criteria for Cryptographic Algorithm Design Process[S].
  • 6TERADA R, Pinheiro P G, Koyama K. A new version of FEAL, stronger against differential cryptanalysis[J]. IEICE Trans Fundamentals, 1996,E79-A(1): 28-34.
  • 7SARVAR Patel, ZULFIKAR Ramzan. Use of SHA-1 for AKA f0-f5[Z], Yokohama, Japan: 3GPP TSG SA WG3 security--S3#13 S3-000315, 2000.
  • 8GSM 02.09, Security Aspects, Version 3.0.1-1992,ETSI-GSM Technical Specifica-tion[S].
  • 93GPP TS 35.201 version 5.0.0-2002, Specification of 3GPP confidentiality and integrity algorithm, document 1: f8 and f9 specification(Release 5)[S].
  • 10姚惠明,隋爱芬,杨义先.3GPP网络AKA协议中若干算法的设计[J].北京邮电大学学报,2002,25(3):98-102. 被引量:8

共引文献5

同被引文献11

  • 13GPP Pecifications,33.102-2008.Technical specification Group Services and System Aspects:3G Security;Security Archi tecture[S].[s.1.]:3GPP,2008.
  • 23GPP Pecifications,33.105-2007.Technical Specification Group Services and System Aspects;3G Security;Cryptographic Algorithm Requirements[s].[s.1.]:3GPP,2007.
  • 3ZHANG M X,FANG Y G.Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol[J].IEEE Trans.Wireless Commun.,2005,4(02):734-742.
  • 4JUANG W S,WU J L.Efficient 3GPP Authentication and Key Agreement With Robust User Privacy Protection[C].USA:IEEE,2007:2722-2727.
  • 5陈自力 林德敬 林柏钢.第二、三代移动通信系统安全体系的分析与比较.通信技术,2003,6:97-100.
  • 6HU Xin, ZHENG Qiang. AccessSecurity Mechanism in TD-SCDMA System[ EB/OL]. Chinese Scientific Papers Online. (2007-09-01) [2013-05- 11 ] http://www. paper, edu. cn.
  • 7SARAIREH JA, YOUSEF S. Analyses Authentication and Key Agreement Protocol for UMTS Mobile Networks [ C]//Proc. of the 1st Int'l Conf. on Mobile Computing and Wireless Communication. Washington: IEEE Com- puter Society Press, 2006:27-31.
  • 8SARAIREH JA, YOUSEF S. Extension of Authentication and Key Agreement Protocol (AKA) for Universal Mobile Telecommunication System (UMTS) [ J ]. Int' 1 Journal of Theoretical and Applied Computer Sciences, 2006, 1(01) :109-118.
  • 9石亚宾,黄开枝,贺晓珺.基于身份保护的高效3GPP AKA协议[J].电讯技术,2008,48(11):19-23. 被引量:5
  • 10陆峰,郑康锋,钮心忻,杨义先,李忠献.3GPP认证与密钥协商协议安全性分析[J].软件学报,2010,21(7):1768-1782. 被引量:17

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部