Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19642
標題: UMTS的認證與金鑰協議及其應用之研究
A Study of UMTS Authentication and Key Agreement Protocol and Its Applications
作者: 歐俠宏
Ou, Hsia-Hung
關鍵字: Authentication;認證;Key Agreement;UMTS;AKA;Charging;Billing;ITS;Security;Mobile Communication;金鑰協議;計費;帳單;智慧型運輸通訊系統;資訊安全;無線通訊
出版社: 資訊科學與工程學系所
引用: [1] 3GPP http://www.3gpp.org, 2009. [2] 3rd Generation Partnership Project. “Technical Specification Group Services and Systems Aspects, 3G security, security requirements,” 3GPP TS 33.21 V3.0.0, 1999. [3] 3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, 3G security, security threats and requirements,” 3GPP TS 21.133, 2001. [4] 3rd Generation Partnership Project. “Technical Specification Group Services and Systems Aspects, architectural requirements for release 1999,” 3GPP TS 23.121 V3.6.0, 2002. [5] 3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, multimedia broadcast/multicast service (MBMS), architecture and functional description (release 6),” 3GPP TS 23.846, 2002. [6] 3rd Generation Partnership Project. “Technical Specification Group Services and Systems Aspects, telecommunication management, charging management, call and event data for the packet switched (PS) domain,” 3GPP TS 32.015, 2003. [7] 3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, 3G security, specification of the MILENAGE algorithm set, document 1: General,” 3GPP TS 35.205, 2004. [8] 3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, 3G security, specification of the MILENAGE algorithm set, document 2: Algorithm specification,” 3GPP TS 35.206, 2004. [9] 3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, 3G security, specification of the MILENAGE algorithm set, document 5: Summary and results of design and evaluation,” 3GPP TS 35.909, 2004. [10] 3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, functional stage 2 description of location services in UMTS,” 3GPP TS 23.171, 2004. [11] 3rd Generation Partnership Project. “Technical Specification Group Services and Systems Aspects, charging management, charging principles,” 3GPP TS 32.200, 2005. [12] 3rd Generation Partnership Project. “Technical Specification Group Services and Systems Aspects, telecommunication management, charging management, 3G call and event data for the circuit switched (CS) domain,” 3GPP TS 32.005, 2005. [13] 3rd Generation Partnership Project. “Technical Specification Group Services and Systems Aspects, telecommunication management, charging management, charging data description for the circuit switched (CS) domain,” 3GPP TS 32.205, 2005. [14] 3rd Generation Partnership Project. “Technical Specification Group Services and Systems Aspects, telecommunication management, charging management, charging data description for the packet switched (PS) domain,” 3GPP TS 32.215, 2005. [15] 3rd Generation Partnership Project. “Technical Specification Group Services and Systems Aspects, telecommunication management, charging management, charging data record (CDR) transfer,” 3GPP TS 32.295, 2005. [16] 3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, 3G security, access security for IP-based services,” 3GPP TS 33.203, 2006. [17] 3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, 3G security, security architecture,” 3GPP TS 33.102, 2006. [18] 3rd Generation Partnership Project. “Technical Specification Group Services and Systems Aspects, charging and billing,” 3GPP TS 22.115, 2006. [19] 3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, generic authentication architecture (GAA), generic bootstrapping architecture (release 7),” 3GPP TS 33.220, 2006. [20] 3rd Generation Partnership Project. “Technical Specification Group Services and Systems Aspects, telecommunication management, charging management, charging data record (CDR) ¯le format and transfer,” 3GPP TS 32.297, 2006. [21] 3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, bootstrapping interface (ub) and network application function interface (ua), protocol details (release 7),” 3GPP TS 24.109, 2007. [22] 3rd Generation Partnership Project. “Technical Specification Group Services and Systems Aspects, charging management, charging architecture and principles,” 3GPP TS 32.240, 2007. [23] 3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, multimedia broadcast/multicast service (MBMS), architecture and functional description (release 7),” 3GPP TS 23.246, 2007. [24] 3rd Generation Partnership Project, “Technical Specification Group Services and Systems Aspects, security of multimedia broadcast/multicast service (MBMS),” 3GPP TS 33.246, 2007. [25] Ahmed Abdel-Hafez, Ali Miri1, and Luis Orozco-Barbosa, “Authenticated group key agreement protocols for ad hoc wireless networks,” International Journal of Network Security, vol. 4, pp. 90-98, January 2007. [26] C.J. Adler, S. Eichler, T. Kosch, C. Schroth, , and M. Strassberger, “The scalability problem of vehicular ad hoc networks and how to solve it,” IEEE Wireless Communications, vol. 13, pp. 22-28, October 2006. [27] A. Agah and S. K. Das, “Preventing DoS attacks in wireless sensor networks: A repeated game theory approach,” International Journal of Network Security, vol. 5, pp. 145-153, 2007. [28] Adel Al-Hezmi, Michael Knappmeyer, Bjorn Ricks, Filipe Cabral Pinto, and Ralf Tonjes, “Enabling ims with multicast and broadcast capabilities,” IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications(PIMRC 2007), pp. 1-5, September 2007. [29] Jaafer Al-Saraireh and Sufian Yousef, “A new authentication protocol for umtsmobile networks,” EURASIP Journal onWireless Communications and Networking, vol. 2006, pp. 1-10, 2006. [30] A. Alrabady, M. Gruteser, B. Hoh, and H. Xiong, “Enhancing security and privacy in tra±c-monitoring systems,” IEEE Pervasive Computing, vol. 5, pp. 38 - 46, October -December 2006. [31] Architecture Development Team, “ITS executive summary,” Research and Innovation Technology Administration (RITA), US Department of Transportation, January 2005. [32] Architecture Development Team, “ITS user services document,” Federal Highway Administration, US Department of Transportation, May 2007. [33] Architecture Development Team, “National ITS architecture - security,” Research and Innovation Technology Administration (RITA), US Department of Transportation, May 2007. [34] M.M. Artimy, W.J. Phillips, and W. Robertson, “Connectivity with static transmission range in vehicular ad hoc networks,” 3rd Annual Communication Networks and Services Research Conference, pp. 237-242, May 2005. [35] B. Askwith, M. Merabti, and Q. Shi, “MNPA: a mobile network privacy architecture,” Computer Communications, vol. 23, pp. 1777-1788, December 2000. [36] A. Benslimane, “Localization in vehicular ad hoc networks,” Systems Communications 2005, pp. 19 - 25, August 2005. [37] R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung, “The kryptoknight family of light-weight protocols for authentication and key distribution,” IEEE/ACM Transactions on Networking, vol. 3, pp. 31-41, February 1995. [38] J.-J. Blum, A. Eskandarian, and L.-J. Ho®man, “Challenges of intervehicle Ad Hoc networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 5, pp. 347-351, December 2004. [39] V. Bocan, “Threshold puzzles: The evolution of DoS-resistant authentication,” Periodica Politechnica, Transactions on Automatic Control and Computer Science, vol. 49, pp. 1-6, 2004. [40] Mohamed-Salah Bouassida, Isabelle Chrisment, and Olivier Festor, “Group key management in manets,” International Journal of Network Security, vol. 6, pp. 67-79, January 2008. [41] Mohamed Salah Bouassida, Gilles Guette, Mohamed Shawky, and Bertrand Ducourthial, “Sybil nodes detection based on received signal strength variations within vanet,” International Journal of Network Security, vol. 9, pp. 22-33, July 2009. [42] M. Burrows, M. Abadi, and R. Needham, “A logic of authentication,” ACM Tran. Computer Systems, vol. 8, no. 1, pp. 18-36, 1990. [43] Atul Chaturvedi and Sunder Lal, “An authenticated key agreement protocol using conjugacy problem in braid groups,” International Journal of Network Security, vol. 6, pp. 181-184, March 2008. [44] Ching-Wen Chen, Ming-Chin Chuang, and Chwei-Shyong Tsai, “An efficient authentication scheme between manet and wlan based on mobile ipv6,” International Journal of Network Security, vol. 1, pp. 14-23, July 2005. [45] H.-B. Chen and S.-C. Hsueh, “Light-weight authentication and billing in mobile communications,” IEEE 37th Annual 2003 International Carnahan Conference on Security Technology (Annual 2003), pp. 245-252, October 2003. [46] Yu-Yi Chen, Jinn-Ke Jan, and Chin-Ling Chen, “A fair and secure mobile billing system,” Computer Networks, vol. 48, pp. 517-524, July 2005. [47] Christos K. Dimitriadis and Siraj A. Shaikh, “A biometric authentication protocol for 3g mobile systems: Modelled and validated using csp and rank functions,” International Journal of Network Security, vol. 5, pp. 99-111, July 2007. [48] F. Dotzer, F. Kohlmayer, T. Kosch, and M. Strassberger, “Secure communication for intersection assistance,” 2nd International Workshop on Intelligent Transportation, 2005. [49] F. Dotzer, F. Kohlmayer, T. Kosch, and M. Strassberger, “VARS: A vehicle Ad-Hoc network reputation system,” Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, 2005. [50] N. El-Fishway and A. Tadros, “On the design of authentication protocols for third generation mobile communication systems,” The Twentieth National Radio Science Conference, pp. C24 1-C24 10, March 2003. [51] European Telecommunication Standards Institute (ETSI). “Recommendation GSM 03.20, security related network functions,” June 1993. [52] F. Eyermann, P. Racz, B. Stiller, C. Schaefer, and T.Walter, “Service-oriented accounting con¯guration management based on diameter,” The 30th Anniversary IEEE Conference on Local Computer Networks, pp. 621-623, November 2005. [53] M. Gerlach, “VaneSe-an approach to VANET security,” V2VCOM 2005, 2005. [54] M. Gerlach, “Assessing and improving privacy in VANETs,” Fourth Workshop on Embedded Security in Cars (ESCAR), November 2006. [55] M. Gerlach, A. Festag, T. Leinmuller, G. Goldacker, and C. Harsch, “Security architecture for vehicular communication,” 5th International Workshop on Intelligent Transportation (WIT), March 2007. [56] G. Godor, B. Varadi, and S. Imre, “Novel authentication algorithm of future networks,” International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, pp. 80-85, April 2006. [57] M. G. Gouda1 and A. X. Liu, “Formal specification and verification of a secure micropayment protocol,” International Journal of Network Security, vol. 7, pp. 81-87, July 2008. [58] C. F. Grecas, S. I. Maniatis, and I. S. Venieris, “Towards the introduction of the asymmetric cryptography in GSM, GPRS, and UMTS networks,” The Sixth IEEE Symposium on Computers and Communications, pp. 15-21, July 2001. [59] C.F. Grecas, S.I. Maniatis, and I.S. Venieris, “Towards the introduction of the asymmetric cryptography in gsm, gprs, and umts networks,” Sixth IEEE Symposium on Computers and Communications, pp. 15-31, JULY 2001. [60] Open Group, “Architecture for public-key infrastructure,” Open Group Draft, May 1997. [61] L. Harn and W.-J. Hsin, “On the security of wireless network access with enhancements,” The 2003 ACM workshop on Wireless security, pp. 88-95, 2003. [62] G. Horn, K.M. Martin, and C.J. Mitchell, “Authentication protocols for mobile network environment value-added services,” IEEE Transactions on Vehicular Technology, vol. 51, pp. 383-392, March 2002. [63] C.-M. Huang and J.-W. Li, “Authentication and key agreement protocol for UMTS with low bandwidth consumption,” The 19th International Conference on Advanced Information Networking and Applications (AINA 2005), vol. 1, pp. 392-397, March 2005. [64] J.P. Hubaux, S. Capkun, and Jun Luo, “The security and privacy of smart vehicles,” IEEE Security and Privacy Magazine, vol. 02, pp. 49-55, May-June 2004. [65] M.-S. Hwang and P.-C. Sung, “A study of micro-payment based on one-way hash chain,” International Journal of Network Security, vol. 24, no. 2, March 2006. [66] IEC(International Engineering Consortium). “IEC SS7 Tutorial.” [67] IEEE P1609.3/D18, “Committee SCC32 of the IEEE intelligent transportation systems council. draft standard for wireless access in vehicular environments (WAVE) - networking services,” December 2005. [68] IETF RFC 2617, “HTTP digest authentication.” [69] ISO/IEC 9798-4. “Information technology - security techniques - entity authentication - part 4: Mechanisms using a cryptographic check function,” 3GPP TS 35.909 V6.0.0, 2004. [70] P. Janson, G. Tsudik, and M. Yung, “Scalability and flexibility in authentication services: the kryptoknight approach,” Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 725-736, April 1997. [71] L. Jin, S. Ren, L. Feng, and G.Z. Hua, “Research on WAP clients supports SET payment protocol,” IEEE Wireless Communications, vol. 9, pp. 90-95, Feb. 2002. [72] Wen-Shenq Juang and Jing-Lin Wu, “Efficient user authentication and key agreement with user privacy protection,” International Journal of Network Security, vol. 7, pp. 120-129, July 2008. [73] D. Jungels, “Certificate revocation in vehicular ad hoc networks,” Technical report of LCA, 2006. [74] Ramanarayana Kandikattu and Lillykutty Jacob, “Comparative analysis of different cryptosystems for hierarchical mobile ipv6-based wireless mesh network,” International Journal of Network Security, vol. 10, pp. 139-152, 2010. [75] A. Karygiannis, A. Kiayias, and Y. Tsiounis, “A solution for wireless privacy and payments based on e-cash,” First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005), pp. 206-218, September 2005. [76] M. Knappmeyer, B. Ricks, R. Tonjes, and A. Al-Hezmi, “Advanced multicast and broadcast content distribution in mobile cellular networks,” IEEE Global Telecommunications Conference(GLOBECOM ''07), pp. 2097 - 2101, November 2007. [77] Geir M. Koien, “Security analysis: Privacy enhanced cellular access security,” The 4th ACM workshop on Wireless security, September 2005. [78] M. Koutsopoulou, G. Farmakis, and E. Gazis, “Subscription management and charging for value added services in UMTS networks,” 2001 IEEE 53th Vehicular Technology Conference (VTC 2001-Spring), vol. 3, pp. 2162-2166, May 2001. [79] M. Koutsopoulou and A. Kaloxylos, “A holistic solution for charging, billing and accounting in 4g mobile systems,” 2004 IEEE 59th Vehicular Technology Conference (VTC 2004-Spring), vol. 4, pp. 2257 - 2260, May 2004. [80] M. Koutsopoulou, A. Kaloxylos, and A. Alonistioti, “Charging, accounting and billing as a sophisticated and recon¯gurable discrete service for next generation mobile networks,” 2002 IEEE 56th Vehicular Technology Conference (VTC 2002-Fall), vol. 4, pp. 2342-2345, September 2002. [81] M. Koutsopoulou, A. Kaloxylos, A. Alonistioti, and L. Merakos, “A platform for charging, billing, and accounting in future mobile networks,” Computer Communications, vol. 30, pp. 516-526, February 2007. [82] Wei-Bin Lee and Chang-Kuo Yeh, “A self-concealing mechanism for authentication of portable communication systems,” International Journal of Network Security, vol. 6, pp. 285-290, May 2008. [83] Chun-Ta Li and Yen-Ping Chu, “Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks,” International Journal of Network Security, vol. 8, pp. 166-168, 2009. [84] Hongwei Li and Atam P. Dhawan, “Mosar: A secured on-demand routing protocol for mobile multilevel ad hoc networks,” International Journal of Network Security, vol. 10, pp. 125-138, 2010. [85] Shiqun Li, Guilin Wang, Jianying Zhou, and Kefei Chen, “Undeniable mobile billing schemes,” 4th European PKI Workshop: Theory and Practice (EuroPKI''07), vol. 4582, pp. 338-34, June 2007. [86] Lockheed Martin Federal Systems, Odetics Intelligent Transportation Systems Division, “ITS communictions document,” Federal Highway Administration, US Department of Transportation, January 1997. [87] Men Long, Chwan-Hwa ⣵76; John ⣵76; Wu, and J. David Irwin, “Reducing com munication overhead for wireless roaming authentication: Methods and perfor mance evaluation,” International Journal of Network Security, vol. 6, pp. 331- 341, May 2008. [88] Kumar Mangipudi, Rajendra Katti, and Huirong Fu2, “Authentication and key agreement protocols preserving anonymity,” International Journal of Network Security, vol. 3, pp. 259-270, November 2006. [89] S. Mohanty and J. Xie, “Performance analysis of a novel architecture to integrate heterogeneous wireless systems,” Computer Networks, vol. 51, pp. 1095-1105, March 2007. [90] M. Naor and M. Yung, “Universal one-way hash functions and their cryptographic applications,” The twenty-¯rst Annual ACM Symposium on Theory of Computing, Seattle, Washington, pp. 33-43, 1989. [91] B.C. Neuman, “Security, payment, and privacy for network commerce,” IEEE Journal on Selected Areas in Communications, vol. 13, pp. 1523-1531, October 1995. [92] US Department of Transportation http://www.its.dot.gov, 2009. [93] B. Ostermaier, F. Dotzer, and M. Strassberger, “Enhancing the security of local dangerwarnings in VANETs - a simulative analysis of voting schemes,” Second International Conference on Availability Reliability and Security (ARES2007), pp. 422 - 431, April 2007. [94] H.-H. Ou, M.-S. Hwang, and J.-K. Jan, “A simple mobile communication billing system among charged parties,” Applied Mathematics and Computation, vol. 192, September 2007. [95] D. Palaka, P. Daras, K. Petridis, and M. G. Strintzis, “A novel peer-to-peer payment protocol,” International Journal of Network Security, vol. 4, pp. 107- 120, January 2007. [96] A. Patcha and J.-M. Park, “A game theoretic formulation for intrusion detection in mobile ad hoc networks,” International Journal of Network Security, vol. 2, pp. 131-137, March 2006. [97] M. Pias, S. Wilbur, S. Bhatti, and J. Crowcroft, “Securing the internet metering and billing,” IEEE Global Telecommunications Conference (GLOBECOM ''02), vol. 2, pp. 1603-1607, November 2002. [98] M. Raya and J.P. Hubaux, “Security aspects of inter-vehicle communications,” 5th Swiss Transport Research Conference (STRC), March 2005. [99] M. Raya and J.P. Hubaux, “The security of vehicular ad hoc networks,” 3rd ACM workshop on Security of ad hoc and sensor networks, 2005. [100] RFC2719. “Framework architecture for signaling transport.” [101] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Communications of the ACM, vol. 21, pp. 120-126, February 1978. [102] K. Shim, “Cryptanalysis of mutual authentication and key exchange for low power wireless communications,” IEEE Communications Letters, vol. 7, pp. 248- 250, May 2003. [103] J.F. Stach, E.K. Park, and K. Makki, “Performance of an enhanced GSM protocol supporting non-repudiation of service,” Computer Communications, vol. 22, pp. 615-680, May 1999. [104] H. Tewari and D. O''Mahony, “Real-time payments for mobile IP,” IEEE Communications Magazine, vol. 41, pp. 126-136, February 2003. [105] IEEE Draft Amendment to Standard for Information Technology, “Telecommunications and information exchange between systems - LAN/MAN specific requirements - part 11: Wireless lan mecium access control (MAC) and physical layer (PHY) specifications: Amendment 3: Wireless access in vehiclular environments (WAVE),” January 2006. [106] H. Wang, Y. Zhang, J. Cao, and V. Varadharajan, “Achieving secure and flexible m-services through tickets,” IEEE Transactions on Systems, Man and Cybernetics, Part A, vol. 33, pp. 697-708, November 2003. [107] Shengbao Wang, Zhenfu Cao, and Haiyong Bao, “Efficient Certificateless Authentication and key agreement (CL-AK) for grid computing,” International Journal of Network Security, vol. 7, pp. 342-347, November 2008. [108] Shengbao Wang, Zhenfu Cao, and Feng Cao, “Efficient identity-based authenticated key agreement protocol with pkg forward secrecy,” International Journal of Network Security, vol. 7, pp. 181-186, September 2008. [109] ITU/ISO Recommendation X.509, “Information technology open systems interconnection - the directory: Public key and attribute certificate frameworks,” 1997. [110] Chou-Chen Yang, Kuan-Hao Chu, and Ya-Wen Yang, “3G and WLAN interworking security: Current status and key issues,” International Journal of Network Security, vol. 2, pp. 1-13, January 2006. [111] Chang-Kuo Yeh and Wei-Bin Lee, “An overall cost- effective authentication technique for the global mobility network,” International Journal of Network Security, vol. 9, pp. 227-232, 2009. [112] S. Yen, L. Ho, and C. Huang, “Internet micropayment bared on unbalanced one-way binary tree,” CrypTEC ''99, pp. 155-162, 1999. [113] S. Yu, S. Yoon, J. Lee, H. Kim, and J. Song, “Service-oriented issues: Mobility, security, charging and billing management in mobile next generation 93 networks,” The 1st International Workshop on Broadband Convergence Networks (BcN 2006), pp. 1-10, April 2006. [114] M. Zafar, N. Baker, M. Fuchs, J. Santos, A. Ikram, and S. Sargento, “Imsmbms integration: Functional analysis & architectural design,” 16th IST Mobile and Wireless Communications Summit, pp. 1-5, July 2007. [115] M. Zhang and Y. Fang, “Security analysis and enhancements of 3GPP authentication and key agreement protocol,” IEEE Transactions on Wireless Communications, vol. 4, pp. 734-742, March 2005. [116] Yu Zheng, D. He, Xiaohu Tang, and Hongxia Wang, “Aka and authorization scheme for 4g mobile networks based on trusted mobile platform,” 2005 Fifth International Conference on Information, Communications and Signal Processing, pp. 976-980, December 2005.
摘要: 
行動通訊的發展與應用提供了現代人生活上不可或缺的便利,近年來第三代行動電話系統的發展方興未艾,尤其是UMTS(Universal Mobile Telecommunication System),它是目前第三代行動電話系統中最為普及且使用人數最多的第三代行動電話系統。發展他的3GPP(3rd Generation Partnership Project)組織為了通訊安全與使用者認證的需求,發展了一個認證與金鑰協議的協定(Authentication and Key Agreement protocol, AKA)。但是很多研究都指出目前的AKA協定有一些問題需要解決,例如:同步問題,儲存空間問題,不安全且容易竊取的認證參數和對相互認證提出的質疑等問題。還有一些研究指出AKA協定有一些先天的缺憾,例如:計算量過載與通訊過載等問題,這些問題不只使得行動通訊系統的安全性受到質疑也可能傷害行動通訊使用者的權益與隱私。很多研究針對這些缺點進行改良並提出安全性較高的改良協定,他們或許解決了原來所發現的問題,但是他們都忽略了實務上的考量而可能喪失實際應用的務實性。

這份研究的第一個目標是設計一個更好且更安全的UMTS-AKA協定,當然也包括了實用性。我們的研究將採用與目前標準相同的技術,解決當前的問題並達到較高的安全性。採用與目前實務協定相同的標準可以確保我們所研究的技術可以無痛的移植到目前的實際環境中應用。

這份研究的第二個目標是解決目前對使用者不公平的計費系統。在目前的行動通訊系統中,UMTS已經成為最為普及且最多人使用的行動通訊系統了。但是UMTS的計費系統是一個單向認證的系統並不注重使用者的權益,而且他還存在著一些待解決的問題;例如:同步問題、離線問題、與必須儲存大量資料以防止事後爭議的解決。設計一個更好且更公平的UMTS計費協定是這個研究的第二個目標。

這份研究的最後目標是去探索其他UMTS應用的可能性。我們將注意力放在目前非常熱門的智慧通訊系統(Intelligent Transportation Systems, ITS)上,這研究將不只是去探討ITS所適用的通訊系統,更重要的是我們將稍微的修改AKA協定,使得他更適合於使用於ITS。

Mobile communication is definitely one of the major high-technology applications that offer present-day people a modern life of appropriate convenience. In recent years, the third generation cell-phone system has approached maturity. The Universal Mobile Telecommunication System (UMTS) is currently the most widely used system around the world. The 3rd Generation Partnership Project is equipped with the Authentication and Key Agreement (AKA) protocol to maintain secret and secure both during the authentication process and during the telecommunication session through UMTS. However, there are some researches querying the UMTS-AKA protocol exist some problems, such as synchronization question, storage overhead, insecurity with leakiness authentication vector and mutual authentication is weakness. There are still some congenital defects have be querying by some researches, that are computational overhead and communication overhead. These defects are not only caused by mobile communications systems vulnerable and violations of the user''s security also caused the reducing of efficiency. Much research improved these defects and proposed new protocol with the higher security or higher performance, but they all have overlooked the practical.

The first aim of this study is to design the safest and the best UMTS-AKA protocol. Indeed, the purpose is to design a most practical UMTS-AKA protocol. It is very important to adopt the same technology as the current UMTS-AKA protocol. It ensures painless transfer to a new environment without extra cost.

The second aim of this study wants to solve the unfair phenomenon to mobile user under the UMTS billing system. In the present mobile communication environment, UMTS already became the most popular application. However, the UMTS design in billing does not protect the rights and interests of subscribers. It still exist some defects, for example: synchronization, off-line operation and storing many communication witnesses required for judgment when disputation. To design a better and fair billing system is our second objective under modern UMTS specification.

The final aim of this study is to explore the possibility of other applications on UMTS. The study extend the research to the ITS (Intelligent Transportation Systems) which is very popular currently. It not only attempts to identify a suitable communication system for ITS applications but also impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus the study explore other possibilities through this research.
URI: http://hdl.handle.net/11455/19642
其他識別: U0005-2210200901584800
Appears in Collections:資訊科學與工程學系所

Show full item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.