期刊文献+

基于京津城际铁路的GSM-R通信安全评价方法研究 被引量:1

Research on Safety Evaluation Method of GSM-R Communication Based on Beijing-Tianjin Intercity Railway
在线阅读 下载PDF
导出
摘要 GSM-R系统作为铁路信息化专用移动通信平台,在欧洲高速铁路中广泛应用,我国也确定采用该技术作为高速铁路无线传输平台,隐藏于GSM-R系统中的任何安全隐患,都可能导致国家和旅客重大生命财产损失.本论文提出了采用故障树分析法对京津城际铁路GSM-R网络的安全性进行了深入研究,同时对如何保障通信网络安全提出了建议. GSM-R system,as a private mobile communication platform of railway information,is widely used in European high-speed railway.China decides to use the technology as a platform for wireless transmission of high-speed railway,too.Any potential safety problems hidden in GSM-R system can lead to countries and passengers significant losses of lives and property.Fault tree analysis has been adopted to thoroughly study the safety of GSM-R system in Beijing-Tianjin intercity railway,and recommendations have been raised to the question how to ensure the safety of communication network in the meantime.
作者 徐岩 王娟娟
出处 《兰州交通大学学报》 CAS 2011年第6期93-98,共6页 Journal of Lanzhou Jiaotong University
关键词 GSM-R 安全评价 故障树分析 GSM-R safety evaluation fault tree analysis
  • 相关文献

参考文献10

二级参考文献11

  • 1李发荣.预先危险分析在安全评价中的应用研究[J].安全与健康,2004(08S):42-44. 被引量:8
  • 2郑伟民 汤志忠.计算机系统结构(第二版) [M].北京:清华大学出版社,1998..
  • 3中国铁道部.铁路GSM-R数字移动通信系统工程设计暂行规定[S].北京:中国铁道出版社,2007.
  • 4TB10006-2005.铁路运输通信设计规范[s].中国铁道出版社,2005.
  • 5中华人民共和国铁道部.CTCS-3级列控系统总体技术方案(科技运[2008]34号)[S].,2008..
  • 6BS EN 50126 Railway Applications: The Specification &Demonstration of Reliability, Availability, Maintainability and Safety [S]
  • 7BS EN 50128 Railway Applications: Software for Railway Control and Protection Systems [S]
  • 8BS EN 50129 Bailway Applicatons: Safety Belated Electronic Systems for Signaling [S]
  • 9吴昊,钟章队.GSM-R业务及在中国铁路的应用[J].移动通信,2007,31(8):18-22. 被引量:11
  • 10梁玉成.客运信息集成系统施工技术[J].铁道通信信号,2008,44(5):53-54. 被引量:1

共引文献51

同被引文献10

  • 1Humayun B. Survey of routing protocols for mobile ad- hoc network [J]. International Journal of Information and Communication Technology Research, 2011,1 (6) 165-177.
  • 2Hu Y C,Perring A,Johnson D B. Wormhole attacks in wireless networks [J]. Selected Areas in Communica- tions, 2006,24(2) : 370-380.
  • 3Feng T, Zhang B T. Security random network coding model against byzantine attack based on CBC[-C]// Proceedings of the 4th International Conference on In- telligent Computation Technology and Automation. Shenzhen:IEEE Press, 2011,2:1178-1181.
  • 4Feng T, Wang S. UC secure network coding against pollution attacks[,J]. Information Technology Journal, 2012,11(9) : 1175-1183.
  • 5Montenegro G, Castelluccia C. Statistically unique and cryptographically verifiable (SUCV) identifier and ad- dresses[C]// Proc. of 2002 Network and Distributed System Security conference. California: ACM Press, 2002 : 539-545.
  • 6Crescenzo G, Arce G. Improved topology assumptions for threshold cryptography over mobile ad- hoc net- works[C]//Proceedings the 3rd ACM Workshop on Security for Ad-hoc and Sensor Networks. New York ACM Press, 2005 : 53-62.
  • 7Crescenzo G, Arce G. Threshold cryptography in mo- bile ad hoc Networks[-C]//4th International Confer- ence on Security in Communication Networks. New York: Springer-Verlag, 2004 : 1156-1162.
  • 8Blundo C, Santis A. Perfectly secure key distribution for dynamic conferences[,j ]. Information and Compu- tation, 1998,146 (1) : 1-23.
  • 9冯涛,孙冠男,夏彦晖,马建峰.基于本体的拜占庭攻击的建模及检测[J].中国科学院研究生院学报,2011,28(5):696-705. 被引量:1
  • 10李翠然,钟章队,谢健骊.认知的铁路应急自组织网络研究[J].铁道学报,2013,35(1):60-65. 被引量:7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部