DOI QR코드

DOI QR Code

A Secure Protocol for Contents Service in IMT-2000

IMT-2000 기반 컨텐츠 서비스를 위한 보안 프로토콜

  • 이덕규 (순천향대학교 대학원 전산학과) ;
  • 이임영 (순천향대학교 정보기술공학부)
  • Published : 2003.04.01

Abstract

IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply through wireless most of the services being provided through wire, such as Internet services and multimedia high-speed data information. However, during global roaming, the signal data and the user data get transmitted through the networks of other users. Also, it is judged that with the provision of high speed data communication the amount of data communication necessary for confidentiality protection will increase. It is planned that the recent IMT-2000 Project will begin its commercial service in 2002. From this viewpoint, wireless contents, due to their special characteristics, are greatly exposed to illegal actions by third persons. As a result, it can be said that security and certification issues in the mobile telecommunication environment are indispensable matters. For this purpose, it is intended that in this thesis through an analysis of the existent IMT-2000 certification method, a more safe and efficient authentication method is presented and, at the same time, a security protocol necessary in the provision of wireless contents is designed.

IMT-2000은 인터넷 서비스와 멀티미디어 고속 데이터 정보 등 유선예서 제공하고 있는 서비스 대부분을 무선으로 공급하고자하는 사용자의 요구 충족을 위해 등장하였다. 그러나 글로벌 로밍시 신호 데이터 및 사용자 데이터가 타 사업자의 망을 거쳐 전송된다. 또한 고속의 데이터 통신이 제공됨에 따라 기밀성 보호에 필요한 데이터 통신량이 증대될 것으로 판단된다. 최근 IMT-2000사업은 2002년을 기점으로 상용 서비스가 진행될 예정이다. 이러한 시점에서 무선 컨덴츠는 그 특성상 데이터에 대한 제 3자로부터의 불법적인 행위에 대해 많이 노출되어져 있다. 따라서 이동 통신 환경에서의 보안과 인증 문제는 필수적인 사항이라 할 수 있다. 이를 위해 본 논문에서는 기존의 IMT-2000 인증 방식 분석을 통해 더욱 안전하고 효율적인 인증 방식을 제시함과 동시에 무선 컨텐츠 제공에 있어 필요한 보안 프로토콜을 설계하고자 한다.

Keywords

References

  1. 3GPP TS 33.102, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G Security security Architecture.'
  2. 3GPP TS 22.022, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; Personalisation of UMTS Mobile Equipment (ME) ; Mobile functionality specification.'
  3. 3GPP TS 33.103, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G security ; integration Guidelines.'
  4. 3GPP TS 33.105, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G security ; Cryptographic Algorithm Requirements.'
  5. 3GPP TS 33.120, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G security ; Security Principles and Objectives.'
  6. 3G TR 33.901, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G security ; Criteria for cryptographic algorithm design process.'
  7. 3G TR 33.902, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G security ; Formal Analysis of the 3G Authentication Protocol.'
  8. 3G TR 33.908, '3rd Generation Partnership Project(3GPP) ; Technical Specification Group Services and System Aspects ; 3G security ; General Report on the Design, Specification and Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms.'
  9. ETSI SAGE, 'Security Algorithm Group of Experts(SAGE) ; General Report Design, Specification adn Evaluation of the MILENAGE Algorithm Set : An Example Algorithm Set for the 3GPP Authentication and Key Generation Functions.'
  10. ESTI SAGE, 'Specification of the MILENAGE Algorithm Set : an Example Algorithm Set for the 3GPP Authentication and Key Generation Functions f1, $f1^*$, f2, f3, f4, f5, and $f5^*$,' Document 1 : Algorithm Specification
  11. ESTI SAGE, 'Specification of the MILENAGE Algorithm Set : an Example Algorithm Set for the 3GPP Authentication and Key Generation Functions f1, $f1^*$, f2, f3, f4, f5, and $f5^*$,' Document 2 : Implementors' Test Data
  12. ESTI SAGE, 'Specification of the MILENAGE Algorithm Set : an Example Algorithm Set for the 3GPP Authentication and Key Generation Functions f1, $f1^*$, f2, f3, f4, f5, and $f5^*$,' Documents 3 : Design Conformance Test Data
  13. ITU : ITU-R SECURITY PRINCIPLES FOR INTERNATIONAL MOBILE : TELECOMMUNICATIONS-2000 (IMT-2000) Recommandation ITU-R M.1078
  14. ITU : EVALUATION OF SECURITY MECHANISMS FOR IMT-2000 : RECOMMENDATION ITU-R M.1223
  15. '정보통신 표준화 백서', 정보통신부, 2000
  16. 정원영, 정 욱, 'IMT-2000 보안 위협 및 대책', 1999