(44.192.112.123) 您好!臺灣時間:2021/03/07 17:32
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:李菊花
研究生(外文):Lee, Chii-Hwa
論文名稱:行動通訊之安全研究
論文名稱(外文):A Study on Security for Mobile Communications
指導教授:楊維邦楊維邦引用關係
指導教授(外文):Wei-Pang Yang
學位類別:博士
校院名稱:國立交通大學
系所名稱:資訊科學學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:1998
畢業學年度:86
語文別:中文
論文頁數:115
中文關鍵詞:行動通訊安全密碼學行動電話卡汎歐式行動通訊系統身份確認
外文關鍵詞:Mobile CommunicationsSecurityCryptographyMobile Phone CardGSMAuthentication
相關次數:
  • 被引用被引用:0
  • 點閱點閱:116
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
Recent development and the evolution of wireless
communications and mobile network management have realized the
applications for personal communicationservices. The name
Personal Communications Services (PCS) is often used asa general
term that includes various wireless accesses and personal
mobilityservices. The ultimate goal is to provide mobile users
to access information anywhere, any time, and in any form. In
the near future, tremendous mobileusers will carry a small
terminal, such as mobile phone, mobile station, handset,
personal communication system, or portable computer to
accessinformation through the wireless networks. With the
tremendous applicationsand business opportunities provided by
PCS, many issues are explored and neededto solve. Except all
those the involved techniques about the wireless accessand
mobile network management, security issues for the mobile
communicationsare most controversial and most concerned by the
users. From the views of users, the security requirements
consist of user authentication, data confidentiality of
communication, and privacy of user movements.
Authenticationensures that service is not obtained fraudulently
in order to avoid charge forusage; data confidentiality ensures
that an eavesdropper cannot interceptinformation between two
parties; location privacy ensures that the usersmovements cannot
be obtained by third parties who are interested in their current
and past locations. The goal of this study is to explore the
security issues and to propose somenew or some improved
protocols to meet the security requirements for
mobilecommunications. In this dissertation, one new method is
proposed to implementa secure digital mobile communication
system. Additionally, a new key distribution scheme is designed
for practical implementation in a low-cost andlow-power digital
mobile communication system. The most distinguished
digitalcellular system in the world is the Global System for
Mobile Communications(GSM). However, there are some weaknesses
of the security features in the GSM.Therefore, we propose three
improved methods to enhance the security, to reducethe storage
space, to eliminate the sensitive information stored in the
visiteddomain, and consequently to improve the performance of
the system. The merit of the proposed methods is to improve but
not to alter the existing architecture ofthe system. Moreover,
the Subscriber Identity Module (SIM) concept is widelyused in
many mobile communication systems; some limitations and
considerations of using SIM significantly reduce the
availability and accessibility for thepublic in the wireless
communications. the idea of using phone card for thepublic
telephones is introduced for the mobile communications in this
study.major technical issues for using the mobile phone card and
its security considerations will be presented.
Cover
Abstract (in Chinese)
Abstract (in English)
Acknowledgment (in Chinese)
Contents
List of Tables
List of Figures
1
1.1 Mobile Communication Systems
1.2 Security Requirements for Mobile Communications
1.3 Cryptography
1.4 Related Works
1.5 Our Research for Security in Mobile Communication Systems
1.6 Organization of the Dissertation
2
2.1 Introduction
2.2 Related Cryptography
2.3 Authenticated Key-Exchange Scheme
2.4 Security Analysis
2.5 Computational Analysis and Comparison
2.6 Summary and Discussion
3
3.1 Introduction
3.2 The GSM Protocols and Their Weakness
3.3 Enhanced Protocols
3.4 Session Key Generation and Overhead Estimation
3.5 Computational and Capacity Analyses
3.6 Summary and Discussion
4
4.1 Introduction
4.2 Mobile Phone Card Application
4.3 Architecture of Wireless Mobile Communications
4.4 Location Tracking Operation
4.5 Billing Scheme
4.6 Authentication of A Mobile Phone Card
4.7 Operational Considerations and Summary
5
5.1 Research Results
5.2 Further Research Topics and Directions
Bibliography
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔