期刊文献+

移动网络安全防护技术 被引量:10

Security Service Technology for Mobile Networks
在线阅读 下载PDF
导出
摘要 移动网络向着高速率、全IP方向发展,承载的业务种类也越来越多,这就对移动网络的安全提出了新的要求。传统的安全方案并不能适应新的安全需要。文章分析了3G/4G移动网络的安全威胁和需求,从移动网络的整体架构出发,提出了基于安全服务的安全防护方案。该方案在移动终端上构建可信计算环境,将软件合法性验证与访问控制相结合,在服务管理中心对移动终端提供完整性检查和软件合法性验证等安全服务,从而在很大程度上保护了移动终端以及移动网络的安全。进一步,文章给出了未来需研究的问题及发展方向。 As mobile networks become high speed and attain an all IP structure,more and more services are possible.This brings about many new security requirements that traditional security programs cannot adapt to.This paper analyzes security threats and the needs of 3G/4G mobile networks.It proposes a novel protection scheme for mobile networks encompassing the whole structure of the mobile network.Trusted computing is built into mobile terminals—a scheme in which software validity verification is combined with access control,and validity and integrity are checked in the security management center in order to secure the mobile terminal.In this way,terminals and the network as a whole is secured to a much greater extent.This paper also highlights problems to be addressed in future research and development.
出处 《中兴通讯技术》 2011年第1期21-26,共6页 ZTE Technology Journal
基金 国家高技术研究发展"(863")计划(2009AA01Z427)
关键词 移动网络安全 安全服务 可信计算 访问控制 mobile network security security service trusted computing access control
  • 相关文献

参考文献19

  • 1LEI Min,BI Hai.FENG Zhengjin.Security Architecture and Mechanism of Third Generation Mobile Communication[C] //Proceedings of the 2002 IEEE Region 10 Conference on Conference on Computers,Communications,Control and Power Engineering(TENCON'02):Vol 2,Oct 28-31,2002,Beijing,China.Piscataway,NJ,USA:IEEE,2002:613-816.
  • 2YANG Hao,RICCIATO F,LU Songwu,et al.Securing a Wireless World[J].Proceedings of the IEEE,2006,94(2):442-454.
  • 3ZHENG Yu,HE Dake,YU Weichi,et al.Trusted Computing-Based Security Architecture for 4G Mobile Networks[C)//Proceedings of the 6th International Conference on Parallel and Distributed Computing,Applications and Technologies(PDCAT'05),Dec 5-8,2005,Dalian,China.Los Alamitos,CA,USA:IEEE Computer Society,2005:251-255.
  • 4戴沁芸,王允非.网络安全迎来3G时代[J].信息安全与通信保密,2010,7(5):34-37. 被引量:14
  • 5AL-FAYOUMl M,NASHWAN S,YOUSEF S,et al.A New Hybrid Approach of Symmetic/ Asymmetric Authentication Protocol for Future Mobile Networks[J].Proceedings of the 3rd lEEE International Conference on Wireless and Mobile Computing,Networking and Communications(WIMOB'07),Oct 8-10,2007,Whire Plains,NY,USA.Piscataway,NJ,USA:lEEE,2007:29.
  • 6AL-MUHTADI J,MICKUNAS D,ROY CAMPBELL R.A Lightweight Reconfigurable Security Mechanism for 3G,4G Mobile Devices[J].IEEE Wireless Communications.2002,9(2):60-65,.
  • 7ZHANG Muxiang,FANG Yuguang.Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol[J].IEEE Transactions on Wireless Communications,2005,4(2):734-743.
  • 8DIAB W B,PRISM S.VPN Solution for Securing Voice over Third Generation Networks[C] //Proceedings of the 2nd International Conference on Internet Multimedia Services Architecture and Applications(IMSAA' 08),Dec 10-12,2008.Bangalore,India.Piscataway,NJ,USA:IEEE,2008:6p,.
  • 9KAMBOURAKIS G,ROUSKAS A,GRITZALIS S.Using SSL/TLS in Authentication and Key Agreement[C] //Proceedings of the 4th International Workshop on Mobile and Wireless Communications Network(MWCN'02),Sep 9-11,2002.Stockholm,Sweden.Piscataway,NJ,USA:IEEE,2002:152-156.
  • 10AIASH M,MAPP G,LASEBAE A,et al.Providing Security in 4G Systems:Unveiling the Challenges[C] //Proceedings of the 6th Advanced International Conference on Telecommunications(AICT.10),May 9-15,2010,Barcelona,Spain.Los Alamitos.CA,USA:IEEE Computer Society,2010:439-445,.

二级参考文献60

共引文献48

同被引文献56

引证文献10

二级引证文献210

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部