The Analysis and Amendment of Security System in 3G

HTML  Download Download as PDF (Size: 517KB)  PP. 1-5  
DOI: 10.4236/iim.2009.11001    7,653 Downloads   11,790 Views  Citations
Author(s)

Affiliation(s)

.

ABSTRACT

This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR.

Share and Cite:

ZHAO, M. and SHI, L. (2009) The Analysis and Amendment of Security System in 3G. Intelligent Information Management, 1, 1-5. doi: 10.4236/iim.2009.11001.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.