移动通信环境下位置隐私保护方案的研究

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

上海交通大学硕士学位论文移动通信环境下位置隐私保护方案的研究姓名:彭苗申请学位级别:硕士专业:计算机应用技术指导教师:陈克非20070101IGSM3GGSM3GIPII1234—RSAIPIIIRESEARCHINLOCATIONPRIVACYPROTECTIONMECHANISMFORMOBILECOMMUNICATIONENVIRONMENTABSTRACTWiththedevelopmentofmobilenetworktechnology,locationinformationisconsideredasanessentialcomponentfortheprovisionofdiversifiedvalue-addedservices.However,misuseoftheuser’slocationinformationwouldbringlocationprivacyconcern.Withoutprotectionschemes,extensivedeploymentsofthesetechnologieswouldthreatentheuser’ssecurity.Andtheseconcernswouldblocktheimplementofthetechnology.Nowadays,moreandmoresecuritysensitiveapplicationssuchasE-commerce,E-governmentandmilitarycommunicationareintroduced.Howtoacquireusers’locationinformationlegallyandhowtoprotecttheinformationfromeavesdroppingandabusebecomeahotresearchtopic.Firstly,thepapersimplydiscussedthelocationprivacymechanismsinGSMand3Gcommunicationsystems.Thepotentialthreatsandattacksareanalyzedaswellasattackmodels.LocationprivacyissuesinIVmobileIPnetworkarealsoanalyzed.Then,asecuritymodeloflocationprivacywasproposed.Themodeldefinesageneralapplicationenvironmentaccordingtopossiblethreatstolocationprivacy.Consideringthesethreats,wedefineseveralsecurityservicesinthemodel.Performancefactorsarealsodefinedforlocationprivacyprotectionmechanismdesign.Basedonthesecuritymodel,wepointoutfourmainissuesinsomeofthecurrentlocationprivacyprotectionsolutions:(1)noeffectivedataintegrityprotection,(2)vulnerabletodataleakageandtrafficanalysisattack,(3)unauthorizedaccessfromserviceprovider’snetwork,4)trafficdelay.Tosolvetheseproblems,anovellocationprivacyprotectionmechanismisproposed.Inthismechanism,ablindsignatureschemeisdesignedtorealizeidentityprotectionandlocationinformationprotection.Asamerit,Moreover,thelocationinformationcanbecontrolledbytheuserbecausetheanonymousidisindependent.Finally,securityperformanceandpossibleappliedscenariosofthenewmechanismarediscussed.Weexpectedthattheproposednewmethodinthisthesiscouldbewidelyadoptedbythecommunicationoperatorsandserviceproviders.KEYWORDS:locationprivacy,GSM(GlobalSystemforMobileCommunications),3G(3rdGeneration),mobileIP,blindsignature20071252007125200712511.1202G3G4GWCDMACDMA2000TD-SCDMAUMTSANYTIMEANYWHEREANY-MOTION[1]FDMA2G2.5G3G4GAMPSTACSNAMTSMNTS2[2]20801992(TDMA)GSM90AMPSDAMPSQualcomm(CDMA)1995CDMAPHSCDMAGSM[3](3G)3G3G3G3G,[4]32Mb/s(4G)(Broadband)2Mb/s150Mb/s()MAN)ISDNATM,[5]2G2.5G3G2G2.5G3G3G3GWCDMACDMA2000TD-SCDMA2GGSM2.5GGPRSCDMA2000-1x3G3G3GWCDMACDMA2000-3XTD-SCDMA3GGSMGSMGPRS3GWCDMA3GWCDMA3GCDMA20002G2.5G3GInternet43GInternetInternetIP1.2LocationPrivacyLP[6]5MobileNodeMNGSMIP3GIP1.3GSM3GIP6GSM3GIPLP7LP2.12GTDMAGSM3GGSMSIMGSM3G2G3G[7]GSM3G2.2GSMLPGSMLPGSMLP2.2.1GSMGSM2-1GSM3MobileStation,MSBaseStationSubsystem,BSSNetworkSwitchingSubsystem,NSS[8]LP8MSPDABSC/BTSBSCBTSBTSBTSBTSBTSBTSBSCMSCVLREIRHLRAuCG-MSCPSTNMSBTSMSMSMSFigure2-1GSMNetworkInfrastructure2-1GSMBSCBSCMSCGSMGSMMSCPSTNPSTNMSCMSCGMSCGSMHLRVLREIRLP9HLRPLMNHLRGSMMAPMSCVLRVLRMSVLRMSCMSHLRVLREIRMS-IMEIAuCAuCSIMGSM2-2[4](A5,Kc)SIM(A3,A8,Ki,IMSI)MSUm(A5,Kc)BTSMSCVLR(RAND,SRES,Kc,TMSI)HLR(RAND,SRES,Kc)AuC(A3,A8,Ki,ISMI)MAP-xAFigure2-2GSMEntitiesandSecurityInformation2-2GSM2.2.2GSMLPGSMIMSIHLRVLRSIMMCCMNCMSIN2-3LAIMCCMNCIMSILACLP10MCCMNCMSIN3Digits2DigitsNotmorethan15digitsFigure2-3IMSIstructure2-3IMSIGSM-SIM2-2IMSIKiAuCIMSIKiAuC2-4[9]MSHLR/AuCMSC/VLRAccessRequest(IMSI/TMSI+LAI)VectorRequest(IMSI)Generateauthenticatevector(RAND,XRES,Kc)ReturnvectorAuthrequestSRES=A3(RAND,Ki)GeneratesessionkeyKcReturnSRESIsSRESequaltoXRES?ReturnauthresultFigure2-4Authenticationprocedure2-4MSMSMSC/VLRIMSIMSC/VLRHLR/AuCLP11AuCIMSIKiA3RANDXRESKCRANDXRESKCA8AuCRANDXRESKCMSC/VLRMSC/VLRRANDMSMSSIMRANDKiA3A8SRESKCSRESMSC/VLRMSC/VLRMSSRESAuCXRESMSKCMSTMSILAIVLRTMSIIMSIMSIMSIIMSIHLRGSMIMSIIMSIGSMTMSITMSILAIVLRTMSIIMSITMSI/LAIMSMSCMSMSCVLRMSIMSITMSILAIVLRMSVLRHLRMSIMSIMSIMSITMSIMSTMSITMSIVLRMSLP12TMSITMSIUSIMTMSIMSMSC/VLRTMSIattachdetachMSIMSIMSC/VLRMSC/VLRTMSITMSISIMMSC/VLRMSIMSI[10]2.33GLP2.2GSM3GGSM3G2.3.13G3G3GPP3G[11]2-53G/2-513G2LP1334ApplicationstratumUserApplicationProviderApplicationHomestratum/ServingstratumTETransportstratumUSIMMTSNHEAN(4)(3)(1)(1)(2)(1)(1)(1)(1)Networkaccesssecurity(2)Networkdomainsecurity(3)Userdomainsecurity(4)ApplicationdomainsecurityFigure2-53Goverviewofthesecurityarchitecture2-53GCSPSUMTSCSMSC/VLRPSSGSN/GGSN3GPP3G[12][13]2-62-63USIMUERNCVLRHLRUIDNEUICLP14UIDNUICAKAUSIMDCDIUSIMUERNCVLRSGSNHLRAuCUIDNEUICUSIMEUICLDNUICUEUICSNAKASNDIRNCDIUEDCRNCDCUEf8f9f1,f1*,f2,f3,f4,f5,f6,f10AKAUSIMf0,f1,f1*,f2,f3,f4,f5,A3/A8,c1,c2,c3AKAHLRf7f10Figure2-63Gfunctionalsecurityarchitecture2-63G2-63GPP10[14]f0-f5USIMAuCf5f5*f0-f5f1*f5*f8f9KASUMI3GUERNC2.3.23GLP3GGSMLP15EUICUIDNIMSI3GGSMKUSIMAuCUSIMHESQNMSSQNHESQNHESQNMSUSIM[11]GSMGSM3GGSM/SN/VLRIMSITMSIP-TMSISN/VLRTMSIIMSIIMSIIMSIHE/VLRHE/VLRSN/VLRRANDXRESCKIKAUTNRANDAUTNGSMUSIMSN/VLR3GIMSIIMSIIMSIEUICUIDN3GPPf6f72-7GKHE/AuCLP16SEQ_UICUSIMMSINIMSIf6f7GKGKSEQ_UIC||MSINEMSINSEQ_UIC||MSINEMSINUSIMUIDNFigure2-7EUICimplementationprocess2-7EUICIMSIMSINGKVLRVLRHLRHLRUIDNGIGKVLRGS

1 / 72
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功