| The development of wireless networks brings about a lot of new services, such as wireless office, e-commerce, wireless bank and so on. These services need high-level security, while the security of network depends on the security of access. The access security plays a significant role for the entire system.This paper carries out deep research on access security of UMTS and analyses the security of mechanisms of access authentication, data encryption and integrity protection respectively. According to the security flaws, two corresponding solutions are proposed. Meanwhile, for the trend of UMTS-WLAN interworking, this paper analyses the security of access authentication and proposes an improved solution to improve the security.Main innovation and contribution of this paper are as follows:(1) Research on the network structure of UMTS, principles and objectives of design for security, security architecture and access security. Analyze on the access security, point out the security flaws and the potential attacks.(2) Research and design an improvement based on hybrid cryptosystem and WPKI to enhance the security. Meanwhile, the paper gives a solution to deal with the problem when the terminal query the status of certificate. This improvement solves the security problems and potential attacks, such as man-in the middle attack, Denial of Service (DoS) attack and so on.(3) Analyze the mechanism of data encryption and integrality protection of UMTS system. Research and design an improvement based on elliptic curve cryptosystem according to the security flaws.(4) According to the access security of integration of UMTS and WLAN, research and design an improvement based on elliptic curve cryptosystem and Diffie-Hellman key exchange algorithm to improve the security of the UMTS and WLAN integration. At the same time, this paper proposes a solution based on the combination of Diffie-Hellman key exchange algorithm and symmetric key encryption algorithm. This proposal successfully implements the authentication of access point AP and encryption of sensitive data to enhance the security and confidentiality. |