The Analysis and Amendment of Security System in 3G

نویسندگان

  • Min Zhao
  • Ling Shi
چکیده

This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

The Effect of L-arginine Supplementation on Blood Pressure in Patients with Type 2 Diabetes: A Double-Blind Randomized Clinical Trial

Background: The prevalence of hypertension in patients with type 2 diabetes (T2D) is approximately twice as much as healthy people. This study was designed to determine the effect of L-arginine supplementation on blood pressure in patients with T2D. Methods: In a double-blind randomized clinical trial, 75 T2D were randomly divided into three groups (3 g/d and 6g/d of L-arginine and placebo) for...

متن کامل

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

حدود صلاحیت مجلس شورای اسلامی در اصلاح لایحه بودجه

This article is about the potential for legislstive changes to the bugett policy in Iranian legal system. Firstly three modeles of parliament amendment powers (Unfettered amendment powers, Constrained amendment powers, No amendment powers),is studied and then in this conceptual framework and according to Constitution, some laws, Parliamentary procedure, procedures of Guardian Council, and pri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Intelligent Information Management

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2009