Chapter 9 Mobile Communication Systems
-
Upload
khangminh22 -
Category
Documents
-
view
0 -
download
0
Transcript of Chapter 9 Mobile Communication Systems
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 0
Chapter 9
Mobile Communication Systems
(Modified by LTL)
Adapted from class notes by
Prof. Leszek T. Lilien, CS, Western Michigan University
and
Prof. Dharma P. Agrawal & Qing-An Zeng, University of Cincinnati
Most slides based on publisher’s slides for 1st and 2nd edition of: Introduction to Wireless and Mobile Systems by Agrawal & Zeng
© 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved.
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 1
Outline
9.1. Introduction
9.2. Cellular System Infrastructure
9.3. Registration
9.4. Handoff Parameters and Underlying Support Parameters Influencing Handoff
Handoff Underlying Support
9.5. Roaming Support Home Agents, Foreign Agents, and Mobile IP
Rerouting in Backbone Routers
9.6. Multicasting
9.7. Security and Privacy Encryption Techniques
Authentication
Wireless System Security
9.8. Firewalls and System Security
(Modified by LTL)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 2
9.1. Introduction
Ideal cellular infrastructure:
MS able to communicate with any other MS in the
world
Across cells
Across MSC areas (MSC = mobile switching center)
Across systems owned by different service
provider
To approach the ideal, need
Handoffs
Roaming
across these “borders”
© 2016 by Leszek T. Lilien
MS
MS
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 3
9.2. Cellular System Infrastructure
Cellular system infrastructure is fairly complex
Home phone
(PSTN)
GMSC
MSC
BSC …
BS
…
…
MS
…
BS MS
BSC
BS MS
…
BS MS
BSC
BS MS
…
BS MS
BSC
BS MS
…
BS MS
MSC
wired link
[LTL:]
BSC = BS controller MSC = Mobile Switching Center PSTN = Public Switched Telephone Network PSTN connected to the ATM backbone
(Modified by LTL)
Others
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 4
Cellular System Infrastructure (cont.)
Source: 禹帆,無線通訊網路概論,文魁
GMSC
Other PLMNs
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 5
BTS GMSC
HLR
BSC
MS
PLMN
PDN
Modems
Auc
MSC/
VLR
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 6
行動台(Mobile Station ; MS )
車用型(Vehicular Mounted)
手持式(Handheld)
Handset、Notebook、Laptop、PDA、PocketPC、、、
用戶識別卡(Subscriber Identity Module Card)
Independent with handset
較小Plug-in SIM卡 / 較大ID-1 SIM卡
MS = Handset + SIM card
Source: 顏春煌,行動與無線通訊,金禾。
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 7
基地台系統(Base Station System ; BSS )
一個基地台控制器(Base Station Controller;BSC):
無線電資源管理、話務頻道的指派、跳頻控制、執行交遞,無線電性能量測、功率控制等。
一個或多個收發基地台(Base Transceiver Station;BTS) :
包含天線與電路,收送與手機間的無線電波訊號。
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 8
GMSC
PLMNs
PSTN
OMC
Switching System
行動交換中心(Mobile Switching Center;MSC):
相當於交換機功能,建立連線與交換話務或資料。
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 9
Switching System
閘道交換中心(Gateway MSC, GMSC)
負責提供PLMN網路與其他各種不同固定網路間的連接,例如:一般公眾電話網路(PSTN),整體服務數位網路(ISDN),其他Public Land Mobile Network(PLMN)。
GMSC通常都與MSC共同存在於相同的節點上,它可以是網路上任何一台MSC,而該MSC也就被稱為閘道用的交換機(GMSC) 。
OMC(Operation and Maintenance Center)
管理維護中心(維運中心)
效能管理、設定管理、安全管理
Cellular System Infrastructure (cont.)
GMSC
PLMNs
PSTN
OMC
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 10
Switching System
本籍位置記錄(Home Location Register ; HLR)
儲存著行動台之相關永久性及基本資料,也記錄著行動台所在位置的VLR地址。
訪客位置記錄(Visitor Location Register;VLR):一個動態的資料庫,記錄著所有漫遊至它所管轄區域(Location Area; LA)的行動台資料。
驗證中心(Authentication Center;AUC):行動台身分驗證,同時提供特別密碼鎖用以對傳輸的語音和數據進行加密、解密。
BTS GMSC
HLR
BSC
MS
PLMN
PDN
Modems
Auc
MSC/
VLR
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 11
Switching System
設備識別記錄(Equipment Identity Register;EIR)防止手機被盜拷偷打及不符合規格手機的使用。
手機都具備有獨特的設備號碼(International Mobile Equipment Identity;IMEI; 國際移動裝備辨識碼)並記錄在EIR內,有三個資料類別:1. 白名單(White List):正常手機。2. 黑名單(Black List):被偷手機或停止
服務。3. 灰名單(Grey List):被觀察手機。
手機顯示 IMEI : *#06#
AUC
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 13
International Mobile Equipment Identity(IMEI)
國際移動裝備辨識碼(手機產品序號)
TAC + FAC + SNR + SP
447769 + 18 + 209243 + 8
TAC: Type Approval Code
FAC: Final Assembly Code (18 = Singapore)
SNR: Serial Number
SP: Spare
手機顯示 IMEI : *#06#
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 15
9.2. Cellular System Infrastructure – cont. 1
The infrastructure in more detail1) Discussed in Sec. 1:
BTS = base transceiver system (tower + antenna) (tranceiver = transmitter + receiver)
BSC = BS controller (all electronics controlling BTSs, even k*100 BTSs) BS = base station = BTS + BSC
NOTE: We sometimes omit mentioning BTS, as if BTS + BSC were co-located & were an integrated BSSometimes (as in the previous Figure) BTS is denoted as “BS” HLR = home location
register VLR = visitor home
location register
2) Not discussed yet: AUC = authentication
center EIR = equipment
identity register
(Modified by LTL)
p. 191 (頁212) Fig. 9.1
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 16
9.2. Cellular System Infrastructure – cont. 2
Role of AUC (authentication center)
Provides authentication – to verify user’s identity
Provides encryption parameters – to provide confidentiality of calls
=> “prevents” cellular system operators & customers from fraud(not 100% prevention!)
Role of EIR (equipment identity register)
It is database with info about identities of mobile equipment So, e.g., operator
accepts calls only
from equipment
of operator’s owncustomers
=> “prevents” fraud
Implementations: Separate AUC & EIR
Integrated AUC/EIR
(Modified by LTL)
p. 191 (頁212) Fig. 9.1
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 18
Handover (Handoff)HLR VLR
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 20
CM(Call Management)
與撥號有關的控制(Call Control)
通話的建立
選擇傳輸是語音(voice)、數據(data)或傳真(fax)
通話的釋放
加值服務(Supplementary Service)管理
簡訊SMS(Short Message Service)管理
Source: 禹帆,無線通訊網路概論,文魁
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 21
CM(Call Management) 系統建立通話連線程序
1.撥號0939164721(CC+NDC+)
2.詢問HLR
3.取得MSRN(MSC/LA)
4.連線MSC
5.詢問VLR
6.取得TMSI
7.向所屬LA廣播(paging)
8.MS回應
Source: 禹帆,無線通訊網路概論,文魁
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 22
Mobile Station ISDN(MSISDN)
行動台公開之電話號碼
CC + NDC + SN
886 + 920 + 489147
CC: Country Code
NDC: National Destination Code (0920=台哥大)
SN: Subscriber Number
Mobile Station Roaming Number(MSRN)
行動台漫遊號碼(供MSC處理行動台來話)
CC + NDC + SN
886 + 936 + 630123
NDC: National Destination Code (0936=遠傳)
Temporary Mobile Station Number(TMSI) 提供行動台臨時使用號碼(確保用戶號碼隱密性)
e.g. TMSI(hex) = 59E221D3
長度較IMSI短,且可保持IMSI的機密性
由VLR產生
Cellular System Infrastructure (cont.)
系統相關識別碼
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 23
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 24
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 25
9.3. Registration
MS must register before being able to use cellular services
MS registration done each time the MS is switched on
© 2016 by Leszek T. Lilien
Registration needed for:
Billing
Authentication
Specifying access privileges
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 26
9.3. Registration (cont.)
System also needs to know MS’s location BS periodically xmits beacon signal
Beacon signal includes among others:
Cellular network id
Timestamp
Gateway address
ID of the paging area (PA)
Other BS parameters
If MS hears new BS, it adds it to its table – “active beacon kernel table”
When MS wants to make a call, MS gets closest BS from the table
© 2016 by Leszek T. Lilien
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 28
Steps followed for unregistered (e.g.,
was switched off) if MS is outside of
its own subscription (home) area
(Modified by LTL)
VLRHLR
AUC
p. 193 (頁214) Fig. 9.4Registration procedure
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 30
LA區域(Location Area)
依手機目前所在LAI(LA識別碼)來確認手機位置
建立通話連線呼叫手機時,只針對該LA進行廣播(Paging)
Source: 禹帆,無線通訊網路概論,文魁
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 31
BSC BSC
Location Updating(在同一個MSC/VLR服務區內)
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 32
Location Updating(不同MSC/VLR服務區)
Cellular System Infrastructure (cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 34
9.4. Handoff Parametersand Underlying Support
Handoff = change of radio resources from one
cell to another, adjacent cell
For handoff to succeed, the “new” cell needs a
free channel
© 2016 by Leszek T. LilienSource: 禹帆,無線通訊網路概論,文魁
HLR VLR
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 37
9.4.1. Parameters Influencing Handoff – cont. 2
Two ways of determining need for handoff
Signal strength
Carrier-to-interference ratio (CIR)
Example of handoff based on signal strength (= on received power) – from Chapter 5
BSi
Signal strength
due to BSj
X1
Signal strength
due to BSi
BSjX3 X4 X2X5
E
Xk
MS
Pmin
Pi(x) Pj(x)
(Modified by LTL)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 38
9.4.1. Parameters Influencing Handoff – cont. 3
(2nd case) Handoff based on CIR –
when CIR gets too low, handoff must be made
© 2016 by Leszek T. Lilien
通話交遞(Handover)/位置更新(Location Updating)
Carrier-to-interference ratio (CIR)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 39
9.4.2. Handoff Support
Two types of handoff:
Hard handoff
Soft handoff
© 2016 by Leszek T. Lilien
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 40
Hard handoff –
Break before make
(Modified by LTL)
x
x
p. 197 (頁218) Fig. 9.5
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 41
Soft handoff –
Make before break
(Modified by LTL)
x
p. 197 (頁218) Fig. 9.6
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 44
9.5. Roaming Support
Scenario 1: MS moves from Point a to Point b
Supported by MSC1 alone
Scenario 2: MS moves from Point b to Point c
Supported by MSC1 & MSC2
Requires setting up the bidirectional HLR-VLR link between them – as shown
in fig on next slide
(Modified by LTL)
p. 199 (頁220) Fig. 9.8
Handover
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 46Source: 禹帆,無線通訊網路概論,文魁
GMSC
Other PLMNs
漫遊(Roaming) 經由不同網路經營者間的合作,使得各用戶均可利用其他經營者的網路,從而擴大用戶使用範圍
行動電話用戶可以在本國以外的行動電話網路使用行動通訊服務即稱之為國際漫遊(International Roaming)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 48
行動通訊系統
由許多子系統(Subsystem)共同組成
各個地區的子系統彼此間能互相配合來完成系統的各項功能,這種區域分割的觀念就稱為行動通訊系統的地理階層(Hierarchy)。
Source: 禹帆,無線通訊網路概論,文魁
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 49
LA區域(Location Area)
依手機目前所在LAI(LA識別碼)來確認手機位置
建立通話連線呼叫手機時,只針對該LA進行廣播(Paging)
Source: 禹帆,無線通訊網路概論,文魁
行動通訊系統(cont.)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 51
行動通訊系統(cont.)
MSC/VLR服務區域(Service Area)
MSC/VLR區域包含許多LA
BSC BSC
Source: 禹帆,無線通訊網路概論,文魁
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 52
行動通訊系統(cont.)
PLMN服務區域(Service Area)
一個PLMN (Public Land Mobile Network)服務區域為一家電信業者所經營範圍。
Source: 禹帆,無線通訊網路概論,文魁
GMSC
Other PLMNs
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 53
行動通訊系統(cont.)
全球服務區域(Service Area)
涵蓋全世界所有PLMN區域。
數家電信業者彼此間的PLMN區域某部分會互相重疊。
Source: 禹帆,無線通訊網路概論,文魁
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 55
Mobile Communications
HSDPAHSUPAHSPA+
WiMAXLTE
2.5G2.9G
3G
3.5G
3.9G
4G
3G
2G
2GCDMA
LTE(Long-Term Evolution)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 57
Stage 1: GPRS Network
MSC
BSC
PSTN
A
BTS BTS
GSM
MSC SGSN
BSC
PSTN PDN
A Gb
GGSN
BTS BTS
GPRS
PCU
Source: www.cisco.com
2G GSM 4G LTE Networks
2G 2.5G
InternetPublic telephone
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 58
Evolution Stage 2 (R99 UMTS)
MSC SGSN
BSC
PSTN PDN
A Gb
GGSN
BTS BTS
GPRS
PCU
RNC
Iu
MSCU SGSNU
PSTN PDN
GGSN
Iu
Node B Node B
UMTS (R99)
Iub
Iur
BSC
A
Gb
BTS BTS
PCU
Source: www.cisco.com
3G2.5G
InternetTelephone
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 59Source: Broche of Motorola
3G WCDMA Architecture
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 60
GSM/GPRS/UMTS
Network architecture
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 62
Evolution Stage 3 (R00 UMTS)
PSTN
R99 UMTS
RNC
Iu
PSTN PDN
GGSN
Iu
Node B Node B
Iu
b
Iur
BSC
A
Gb
BTS BTS
PCU
MSCU SGSNU
RNC
Iu Services
Domain
(IN Feature
Servers)
GGSN/
MGW
Node B Node B
R00 all IP UMTS
SGSN
Iub
Iur
Call Processing
Domain
PDN
IP Core
Source: www.cisco.com
3G 3G+/4G
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 63
4G LTE (Long Term Evolution)
architecture
63
http://www.gl.com/images/lte-analyzer-web-main-image.gif
2GGSM
3GWCDMA
Internet
4G LTE
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 64Source: http://www.2cm.com.tw/news/images/N091016003320091016180545.jpg
4G LTE (Long Term Evolution)
architecture
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 65
Evolution Stage 4 (R00+)
(Combined GSM/CDMA- Cisco View)
All- IP Core Network (R00+)
Gateways
RNC
Server
PDNPSTN
Node B Node B
SDU
CDMA
BTS
GSM
BTS
BSC
ServerCommon
Services
Manager
PSTN
RNC
Iu Services
Domain
(IN Feature
Servers)
GGSN/
MGW
Node B Node B
R00 all IP UMTS
SGSN
Iub
Iur
Call Processing
Domain
PDN
IP Core
IP Core
Feature Servers
Source: www.cisco.com
3G+/4G Beyond 4G
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 66
9.5.1. Home Agents, Foreign Agents,
and Mobile IP
Circuit Switching
Packet Switching
Use Mobile IP
(= Mobile Internet Protocol)
© 2016 by Leszek T. Lilien
p. 200 (頁222)
RNC
Iu
MSCU SGSNU
PSTN PDN
GGSN
Iu
Node B Node B
Iub
Iur
BSC
A
Gb
BTS BTS
PCU
InternetTelephone
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 73
Circuit Switching
Communication in which a dedicated communications
path is established between two devices through one
or more intermediate switching nodes
Dominant in both voice and data today
e.g. PSTN is a circuit-switched network
A與B之間建立一專屬通道A
B
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 74
Circuit Switching (cont.)
GSM電路交換的傳輸型態
MSC SGSN
BSC
PSTN PDN
A Gb
GGSN
BTS BTS
PCU
GSM MS
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 76
Def:
將資料切割成一段段封包(packets)再送收的交換技術
The use of packets
Packet Switching
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 78
Packet Switching
封包交換的傳輸型態
MSC SGSN
BSC
PSTN PDN
A Gb
GGSN
BTS BTS
PCU
GPRS MS
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 86
Data Plane for GPRS network
IP for Cellular System
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 89
Home agent and foreign agent
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 90
Host address and care-of address
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 91
Triangle routing
(Tunneling)
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 92
英法海底隧道(Tunneling)
http://upload.wikimedia.org/wikipedia/commons/thumb/4/4f/Course_Channeltunnel_en.svg/2000px-Course_Channeltunnel_en.svg.png
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 93
區間列車穿梭英吉利海峽隧道運送卡車到倫敦(Tunneling)
http://img.epochtimes.com/i6/1011091056161758_1.jpg
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 96
Encapsulation is the Key (Tunneling)
1
2
3
HomeAgent
ForeignAgent
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 100
Encapsulation is the Key (Tunneling)
1
2
3
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 107
9.7. Security and Privacy Security challenges in wireless systems
1) Assured delivery of messages
Example attack: Jamming by a powerful
transmitter
A solution: use frequency hopping
2) Authenticity of messages
A solution: use digital signatures
3) Secrecy of messages
A solution: use encryption of messages
Solutions for Challenges 2 and 3 based on:
Cryptography
© 2016 by Leszek T. Lilien
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 109
加密解密(Encipher and decipher)
Symmetric cryptosystems
http://www.asiapeak.com/img/symmetric.JPG
Encipher Decipher
The same secret key
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 111
9.7.1.
Encryption
Techniques
– cont. 1
Example: block encryption using DES (Data Encryption Standard)
Easy to implement in S/W or H/W Uses a secret encryption key to modify output for given input
Example input – fig. a / Example output – fig. b
Encryption for this example (compare fig. a & b): 57th bit of input block becomes 1st bit xmitted
49th bit of input block becomes 2nd bit xmitted
…
Encryption for this example (compare fig. b & c): 8th bit of received block becomes 1st bit decrypted (recovered)
24th bit of received block becomes 2nd bit decrypted
…
© 2016 by Leszek T. Lilien (Original figures from the textbook used)
p. 208 (頁230) Fig. 9.18
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 114
Classification of Cryptosystemsw.r.t. Keys - cont.
More on: (2) Keyed cryptosystems
2a) Symmetric cryptosystems: KE = KD
Classic
Encipher and decipher using the same secret key
Same key OR one key is easily derived from other
2b) Asymmetric cryptosystems: KE ≠ KD
A.k.a. a public key encryption (PKE)
Encipher / decipher using different keys:
Secret private key + widely-known public key:
< kPRIV, kPUB>
Computationally infeasible to derive the private key from the public
key
It is OK if the public key easily derived from the private key
[cf. B. Endicott-Popovsky, U. Washington]
© 2016 by Leszek T. Lilien
E DP C P
KE KD
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 115
加密解密
Asymmetric cryptosystems
http://www.asiapeak.com/img/asymmetric.JPG
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 116
Public Key Encryption (PKE)
(asymmetric cryptosystem)
Recall: Two main types of cryptosystems:
Secret key encryption (= symmetric
cryptosystem)
Public key encryption (= PKE = asymmetric
cryptosystem)
Outline for PKE
1) Motivation for PKE
2) Characteristics of PKE
3) RSA (Rivest-Shamir-Adelman) Encryption
© 2016 by Leszek T. Lilien
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 117
1) Motivation for PKE
Classic symmetric cryptosystem: with a secret key
Problems:
A lot of keys
o(n2) keys for n users (n * (n-1) /2 keys)
— if each must be able to communicate with each
Secure distribution of so many keys
Secure storage for the keys
User with n keys can’t just memorize them
Can have a system with significantly fewer keys?
Yes!© 2016 by Leszek T. Lilien
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 118
機密資料或鑰匙
復刻007手提箱
http://upload.wikimedia.org/wikipedia/commons/e/e9/EVA_hellokitty1.JPG
http://msnews.n.yam.com/photo_data/20160420010607/L20160420010607_31321.jpg
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 119
2) PKE Definition and Characteristics
1976 — Diffie and Hellman — new kind of cryptosystem:
public key encryption (PKE) =
= asymmetric cryptosystem
Key pair: < kPRIV, kPUB>
Each user owns one private key
Each user shares the corresponding public key with n-1
remaining users => n users share each public key
Only 2n keys for n users 2n = n * (1 + n * 1/n)
Since public key is shared by n people: 1 „owner” + (n-1) others = n
1/n since each part „owns” 1/n of the public key
Even if each communicates with each
Reduction from o(n2) to o(n) keys!
n key pairs are:
<kPRIV-1, kPUB-1 >, <kPRIV-2, kPUB-2>, ..., <kPRIV-n, kPUB-n>
9.7.1. Encryption Techniques – cont. 9
© 2016 by Leszek T. Lilien
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 120
3) RSA Encryption RSA = Rivest, Shamir, and Adelman (MIT), 1978
Based on underlying hard problem:
Number theory – determining prime factors of a
given large number (ex. factoring of small #: 5 5, 6
2 *3)
Arithmetic modulo n
How secure is RSA?
So far remains secure (after all these years...)
Will sb propose a quick algorithm to factor large
numbers?
Who knows… Could happen tomorrow… or never
Will quantum computing break it?
Research will tell - TBD© 2016 by Leszek T. Lilien
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 127
9.7.2. Authentication – cont. 1
Using PKE for Digital Signatures
Transmitting signed msgs from S to R (using PKE)
Original message: (P = plaintext, C = ciphertext)
Privacy transformation by S: C = E(P, KPUB-R)
Only R can decrypt it (with KPRIV-R)
Authenticity transformation = signing by S:
Sg = Sg(S, C) = D(C, KPRIV-S)
Only S can produce Sg(S, C) (with KPRIV-S)
Sent message:
C
Sg
P
© 2016 by Leszek T. Lilien
Secret key
Public keyP
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 128
電子簽章示意圖(利用非對稱性加密)
http://www.cc.ntu.edu.tw/chinese/epaper/20160620_1011.files/image006.gif
Secret key
Public key
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 129
Authentication & Ciphering
Source: 禹帆,無線通訊網路概論,文魁
Data encrypted by Kc
Ki
Ki
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 142
P7.2有一個TDMA系統以270.833kbps的資料來支援8個用戶使用一個訊框。(15分) a)請問各用戶能使用到的原始資料為何? b)如果保護時間與同步化占用10.1kbps,請問流量效率?
c)如果將編碼(7,4)被利用於錯誤處理,請問整體效率為何? (15分)
P7.9在CDMA統計中,為了提高所能服務之行動台數量,嘗試考慮也使用TDMA。這可能嗎?如果可以,要麼做?如果不行,為什麼?
(15分)
Homework #3 (Due in two weeks) -1
Copyright © 2016, Dharma P. Agrawal and Qing-An Zeng. All rights reserved 143
P7.21增加振幅(Amplitude)與相位(Phase)移位置,我們就可以獲得更高的xQAM,譬如64QAM與256QAM。傳輸率似乎可以被無限提升。真的是這樣嗎?請加以說明。 (15分)
P9.22自行選擇一家台灣行動電話系統業者,
整理研究其無線相關技術資訊。
例如:使用頻帶、涵蓋區域(PLMN service area)、網路架構、Frequency Reuse Policy、提供服務類型、、、等等。(其中ㄧ個有興趣的主題即可)
請摘要重點(含圖)整理至1頁(A4), 不含圖半頁。
(本題55分)
Homework #3 (Due in two weeks) -2