检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:王奕腾 肖念浩 朱辉杰 沈力波[1,2] 梁天一 WANC Yi-teng;XIAO Nian-hao;ZHU Hui-jie;SHEN Li-bo;LIANG Tian-yi(National Key Laboratory of Electromagnetic Space Security,Jiaxing,Zhejiang 314033,China;No.36 Research Institute of CETC,Jiaxing,Zhejiang 314033,China)
机构地区:[1]电磁空间安全全国重点实验室,浙江嘉兴314033 [2]中国电子科技集团公司第三十六研究所,浙江嘉兴314033
出 处:《通信对抗》2024年第3期24-28,共5页Communication Countermeasures
摘 要:为了进一步增强移动通信系统的安全性,4G/5G系统采用双向鉴权加密机制,空口信令不直接传输密钥,而是通过分层的密钥构架实现接入层与非接入层密钥的分离,强制实行基于密钥的数据加密、信令加密与完整性保护。文章针对4G/5G系统密钥管理机制开展分析,以基站内切换场景中的密钥衍生与更新为例,对中间密钥衍生及接入层密钥更新原理进行了详细分析。立足工程实践需要,通过采集实际4G信号开展了试验验证,提供了新的密钥衍生与更新实例,旨在为移动通信系统空口安全研究提供参考。To further improve the security of mobile communication system,4G/5G system adopts bidi-rectional authentication and encryption mechanism.The key is not directly transmitted in the air interface signaling,but the separation of the access layer and non-access layer keys is achieved through a hierarchi-cal key architecture.The system enforces key-based data encryption,signaling encryption,and integrity protection.Therefore,we analyze the key management mechanism of the 4G/5G system,and take the key derivation and update in the handover scenario within the base station as an example to analyze the princi-ples of intermediate key derivation and access layer key update.Based on engineering practice needs,ex-perimental verification is conducted by collecting actual 4G signals,providing novel examples of key deri-vation and update,with the aim of providing reference for practical research on air interface security in mo-bile communication systems.
分 类 号:TN929.5[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.222.183.63