원문정보
초록
영어
Abstract. IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply
through wireless most of the services being provided through wire, such as Internet services
and multimedia high-speed data information.[1] However, during global roaming, the signal
data and the user data get transmitted through the networks of other users. Also, it is judged
that with the provision of high speed data communication the amount of data communication
necessary for confidentiality protection will increase. It is planned that the recent IMT-2000
project will begin its commercial service in 2002. From this viewpoint, wireless contents, due
to their special characteristics, are greatly exposed to illegal actions by third persons. As a
result, it can be said that security and authentication issues in the mobile telecommunication
environment are indispensable matters. For this purpose, it is intended that in this thesis
through an analysis of the existent IMT-2000 authentication method, a more safe and efficient
authentication method is presented and, at the same time, a security protocol necessary in the
provision of wireless contents is designed.
목차
1. Introduction
2. Introduction to IMT-2000 and Security Organization Chart
2.1. Introduction to IMT-2000
2.2. Security elements of IMT-2000
3. Global authentication of 3GPP
3.1. The authentication protocol of 3GPP
3.2. Problems
4. Matters requiring security
4.1 A safe database within the network
4.2 Prior sharing of the secret key
4.3 Securing the trust between SN and HE
4.4 A safe communication channel between SN and HE is needed
5. Proposal methods
5.1 Organization elements
5.2. System parameters
5.3 Prior preparation phase
5.4 The authentication phase from MS to HE
5.5 The authentication phase from HE to MS
5.6 The phase of contents provision from MS to SN
6. Comparative analysis
7. Conclusion
8. Reference