The Analysis and Amendment of Security System in 3G
Min ZHAO, Ling SHI
DOI: 10.4236/iim.2009.11001   PDF    HTML     7,697 Downloads   11,809 Views   Citations


This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR.

Share and Cite:

ZHAO, M. and SHI, L. (2009) The Analysis and Amendment of Security System in 3G. Intelligent Information Management, 1, 1-5. doi: 10.4236/iim.2009.11001.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Zhu li-qi, Huang ben-xong. improvement and formal analysis of 3G authentication and key distribution protocol. Electronics Engineers, 05/2004(In Chinese) (朱裏奇,黃本雄. 3G認證和密鑰分配協議的形式化分析與改進. 電子工程師, 5/2004).
[2] Liu zi-long, lu Zheng-xin, huang zhai-lu. 2G and 3G mobile network system security and user authentication. Telecommunications technology, 02/2002(In Chinese)(劉子龍,盧正新,黃載祿. 2G與3G移動網系統安全性及用戶鑒權. 電訊技術, 2/2002).
[3] Li xiang, 3G Security Architecture. Telecommunications Technology, 10/2002(In Chinese)(李翔. 3G的安全體系結構. 電信技術, 10/2002).
[4] Lin de-jing, lin bai-gang, lin de-qing. research and analysis of 3G system-wide network security. ZTE Technology. 02/2003 (In Chinese)(林德敬,林柏剛,林德清. 3G系統全網安全體制的探討與分析. 中興通訊技術, 2/2003).
[5] Liu dong-shu, wei bao-dian, wang xin-mei. improvement of the 3G authentication and key distribution protocol. Journal of Communication, 05/2002(In Chinese)(劉東蘇,韋寶典,王新梅. 改進的3G認證與密鑰分配協定 通信學報. 5/2002).

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.