首页 | 本学科首页   官方微博 | 高级检索  
     

移动网络安全防护技术
引用本文:胡爱群,李涛,薛明富.移动网络安全防护技术[J].中兴通讯技术,2011,17(1):21-26.
作者姓名:胡爱群  李涛  薛明富
作者单位:东南大学信息安全研究中心,江苏,南京,210096
基金项目:国家高技术研究发展("863")计划
摘    要:移动网络向着高速率、全IP方向发展,承载的业务种类也越来越多,这就对移动网络的安全提出了新的要求。传统的安全方案并不能适应新的安全需要。文章分析了3G/4G移动网络的安全威胁和需求,从移动网络的整体架构出发,提出了基于安全服务的安全防护方案。该方案在移动终端上构建可信计算环境,将软件合法性验证与访问控制相结合,在服务管理中心对移动终端提供完整性检查和软件合法性验证等安全服务,从而在很大程度上保护了移动终端以及移动网络的安全。进一步,文章给出了未来需研究的问题及发展方向。

关 键 词:移动网络安全  安全服务  可信计算  访问控制

Security Service Technology for Mobile Networks
HU Aiqun,LI Tao,XUE Mingfu.Security Service Technology for Mobile Networks[J].ZTE Communications,2011,17(1):21-26.
Authors:HU Aiqun  LI Tao  XUE Mingfu
Affiliation:(Information Security Center of Southeast University,Nanjing 210096,China)
Abstract:As mobile networks become high speed and attain an all IP structure,more and more services are possible.This brings about many new security requirements that traditional security programs cannot adapt to.This paper analyzes security threats and the needs of 3G/4G mobile networks.It proposes a novel protection scheme for mobile networks encompassing the whole structure of the mobile network.Trusted computing is built into mobile terminals—a scheme in which software validity verification is combined with access control,and validity and integrity are checked in the security management center in order to secure the mobile terminal.In this way,terminals and the network as a whole is secured to a much greater extent.This paper also highlights problems to be addressed in future research and development.
Keywords:mobile network security  security service  trusted computing  access control
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号