Share This Article:

The Analysis and Amendment of Security System in 3G

DOI: 10.4236/iim.2009.11001    6,991 Downloads   10,613 Views  
Author(s)    Leave a comment


This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

M. ZHAO and L. SHI, "The Analysis and Amendment of Security System in 3G," Intelligent Information Management, Vol. 1 No. 1, 2009, pp. 1-5. doi: 10.4236/iim.2009.11001.


[1] Zhu li-qi, Huang ben-xong. improvement and formal analysis of 3G authentication and key distribution protocol. Electronics Engineers, 05/2004(In Chinese) (朱裏奇,黃本雄. 3G認證和密鑰分配協議的形式化分析與改進. 電子工程師, 5/2004).
[2] Liu zi-long, lu Zheng-xin, huang zhai-lu. 2G and 3G mobile network system security and user authentication. Telecommunications technology, 02/2002(In Chinese)(劉子龍,盧正新,黃載祿. 2G與3G移動網系統安全性及用戶鑒權. 電訊技術, 2/2002).
[3] Li xiang, 3G Security Architecture. Telecommunications Technology, 10/2002(In Chinese)(李翔. 3G的安全體系結構. 電信技術, 10/2002).
[4] Lin de-jing, lin bai-gang, lin de-qing. research and analysis of 3G system-wide network security. ZTE Technology. 02/2003 (In Chinese)(林德敬,林柏剛,林德清. 3G系統全網安全體制的探討與分析. 中興通訊技術, 2/2003).
[5] Liu dong-shu, wei bao-dian, wang xin-mei. improvement of the 3G authentication and key distribution protocol. Journal of Communication, 05/2002(In Chinese)(劉東蘇,韋寶典,王新梅. 改進的3G認證與密鑰分配協定 通信學報. 5/2002).

comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.