The Analysis and Amendment of Security System in 3G ()
Abstract
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR.
Share and Cite:
M. ZHAO and L. SHI, "The Analysis and Amendment of Security System in 3G,"
Intelligent Information Management, Vol. 1 No. 1, 2009, pp. 1-5. doi:
10.4236/iim.2009.11001.
Conflicts of Interest
The authors declare no conflicts of interest.
References
[1]
|
Zhu li-qi, Huang ben-xong. improvement and formal analysis of 3G authentication and key distribution protocol. Electronics Engineers, 05/2004(In Chinese) (朱裏奇,黃本雄. 3G認證和密鑰分配協議的形式化分析與改進. 電子工程師, 5/2004).
|
[2]
|
Liu zi-long, lu Zheng-xin, huang zhai-lu. 2G and 3G mobile network system security and user authentication. Telecommunications technology, 02/2002(In Chinese)(劉子龍,盧正新,黃載祿. 2G與3G移動網系統安全性及用戶鑒權. 電訊技術, 2/2002).
|
[3]
|
Li xiang, 3G Security Architecture. Telecommunications Technology, 10/2002(In Chinese)(李翔. 3G的安全體系結構. 電信技術, 10/2002).
|
[4]
|
Lin de-jing, lin bai-gang, lin de-qing. research and analysis of 3G system-wide network security. ZTE Technology. 02/2003
(In Chinese)(林德敬,林柏剛,林德清. 3G系統全網安全體制的探討與分析. 中興通訊技術, 2/2003).
|
[5]
|
Liu dong-shu, wei bao-dian, wang xin-mei. improvement of the 3G authentication and key distribution protocol. Journal of Communication, 05/2002(In Chinese)(劉東蘇,韋寶典,王新梅. 改進的3G認證與密鑰分配協定 通信學報. 5/2002).
|