The Analysis and Amendment of Security System in 3G
نویسندگان
چکیده
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR.
منابع مشابه
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملThe Effect of L-arginine Supplementation on Blood Pressure in Patients with Type 2 Diabetes: A Double-Blind Randomized Clinical Trial
Background: The prevalence of hypertension in patients with type 2 diabetes (T2D) is approximately twice as much as healthy people. This study was designed to determine the effect of L-arginine supplementation on blood pressure in patients with T2D. Methods: In a double-blind randomized clinical trial, 75 T2D were randomly divided into three groups (3 g/d and 6g/d of L-arginine and placebo) for...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملحدود صلاحیت مجلس شورای اسلامی در اصلاح لایحه بودجه
This article is about the potential for legislstive changes to the bugett policy in Iranian legal system. Firstly three modeles of parliament amendment powers (Unfettered amendment powers, Constrained amendment powers, No amendment powers),is studied and then in this conceptual framework and according to Constitution, some laws, Parliamentary procedure, procedures of Guardian Council, and pri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Intelligent Information Management
دوره 1 شماره
صفحات -
تاریخ انتشار 2009