首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
An introduction to access security in UMTS   总被引:2,自引:0,他引:2  
The first generation of cellular mobile communications systems contained few if any security measures to protect the system operator and users. The second generation generally did a lot better, and contained entity authentication and confidentiality protection. Although this was a major improvement, security protection in the second generation left a lot to be desired. With the advent of 3G mobile systems a serious effort has been made to create a consistent security architecture based on the threats and risks a 3G system faces.  相似文献   

2.
第一代蜂窝移动通信系统几乎没有任何安全机制来保护运营商和用户。第二代移动通信系统从总体上讲有了很大的改进,引进了实体认证和机密性保护措施,但其中的安全问题仍然有许多亟待改进的地方。随着第三代移动通信系统(3G)的出现,需构建一个能够解决3G将要面临的各种安全威胁的和谐同一的安全结构体系。  相似文献   

3.
The development of radio networks has brought the problem of security specifically related to mobility of terminals sharply into focus, and has created the need for radio network operators to implement new security functionalities. The security level of the analog radio mobile systems (the so-called “first generation ” systems was very low, and these systems were often exposed to massive fraud. The development of digital radio mobile systems (the so-called “second generation” systems: GSM, DECT,. allowed the systematic introduction of cryptology based protection mechanisms. Hence, for gsm networks for instance, the main fraud and confidentiality problems were taken into account at the design stage and a security architecture was implemented to provide security services to users and network operators. The third generation mobile telecommunication systems belonging to the imt- 2000 family (which are still under specification within standardisation bodies in particular within the 3gpp worldwide third generation partnership project) will, in the forthcoming years, provide a wide variety of services on a single terminal in a multi-environment (domestic, public, business), multi-operator, and multi-service provider context. Security will be based on second generation systems security functions that have proved to be needed and reliable, and shall be adapted and improved to resolve security threats underlying to new services supplied by third generation radio systems. This document presents examples of security solutions currently implemented for protecting second generation radio mobile systems against frauds and attacks and gives an overview of potential solutions for protecting future third generation radio mobile telecommunication systems.  相似文献   

4.
Security in Wireless Communication   总被引:4,自引:0,他引:4  
Security is a critical issue in mobile radio applications both forthe users and providers of such systems. Although the same may besaid of all communications systems, mobile application havespecial requirements and vulnerabilities, and are therefore ofspecial concern. Emerging wireless networks share many commoncharacteristics with traditional wire-line networks such as publicswitch telephone/data networks, and hence many security issueswith the wire-line networks also apply to the wirelessenvironment. However the integration of security features intowireless communication must take into account restrictions thatmay apply to their use such as small packet size, low bandwidth,high transmission costs, limited processing and storage resourcesand real time constraints. In this paper security requirements inwireless communications along with security features in 2G and 3Gsystems are described.  相似文献   

5.
随着移动通信和计算机技术迅猛发展,移动通信用户人数也在呈现爆发式的增长,移动通信产业市场潜力发展特别巨大,随之而来的人们对移动通信提出了更高的要求。回顾移动通信技术经历了由1G到4G的发展,通话和数字传输功能得到巨大的提高和完善,但是4G系统LTE/LTE-A网络的安全问题却经常被提出,本文就对LTE中的体系结构、访问机制、切换过程中的安全问题进行了研究。  相似文献   

6.
Daoud  F. 《IEEE network》1998,12(4):28-38
Future universal broadband mobile services present a challenge for telecommunications architectures, control, and management. The focus of the future mobile (fourth) generation vision is turned from capacity to services, from radio to network-wide issues. New types of applications will evolve that should be supported by an adequate programmable intelligent telecommunications infrastructure. A convergence between telecom and datacom networks will happen based on the communications middleware concept, which will provide universal secure connectivity between mobile users and their applications. Actual specifications of TINA-C do not address all such necessary issues. There is a need for technology evolution, enhancement, and integration to meet these new requirements at different levels. The author the concept of the universal broadband mobile telecommunications systems (UBMTS, or simply UBM) described as fourth-generation mobile systems. The UBMTS objective is both to extend mobile user access to the range of broadband services that will exist for broadband integrated services digital network (B-ISDN) users, and to extend the customization of new services related to personal communications systems (PCS) users  相似文献   

7.
随着移动通信网络的不断发展,无线接人技术、终端技术、网络技术和业务平台技术正向异构化、多样化和泛在化的趋势发展。下一代移动通信网络具有开放、灵活、可管理、移动的网络架构特点,因此其安全问题将比以往移动通信系统更加复杂。文章从下一代移动通信网络的组网结构人手,结合第二代及第三代移动通信系统存在的安全问题,分析下一代移动通信网络所面临的安全威胁,论述了其应具有的安全体系结构。  相似文献   

8.
3G系统的安全是3G系统正常运行和管理的基本保障,它关系到用户、制造商和运营商的切身利益及信息安全,如何在第三代移动通信系统中保证业务信息的安全性以及网络资源使用的安全性已成为3G系统中重要而迫切的问题。本文通过分析现有的3G认证过程,指出并分析了其存在的漏洞,并在此基础上提出了一种新的基于WPKI环境下的用于实现3G认证的具体方案,并对方案实现过程作了简要介绍,应用该方案增强了3G网中接入认证环节的安全性,而且杜绝了以往非法用户接入合法网络占用资源和合法用户登录非法网络从而泄露信息的现象。  相似文献   

9.
A lightweight reconfigurable security mechanism for 3G/4G mobile devices   总被引:1,自引:0,他引:1  
Wireless communications are advancing rapidly. We are currently on the verge of a new revolutionary advancement in wireless data communications: the third generation of mobile telecommunications. 3G promises to converge mobile technology with Internet connectivity. Wireless data, multimedia applications, and integrated services will be among the major driving forces behind 3G. While wireless communications provide great flexibility and mobility, they often come at the expense of security. This is because wireless communications rely on open and public transmission media that raise further security vulnerabilities in addition to the security threats found in regular wired networks. Existing security schemes in 2G and 3G systems are inadequate, since there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism that can evolve as fast as mobile hosts are evolving into full-fledged IP-enabled devices. We propose a lightweight, component-based, reconfigurable security mechanism to enhance the security abilities of mobile devices.  相似文献   

10.
The development of mobile standards has been a key factor in the widespread success and take-up of second generation (2G) cellular systems. Well though through standards, including roaming aspects, have enabled operators, using equipment from different manufacturers, to create global mobile networks, which allow users to roam seamlessly and obtain largely the same services wherever they happen to be. Third generation (3G) standards have built on the success of 2G and have increased the global awareness and applicability. In this light, this paper discusses the background for mobile standards and the factors that are influencing their ongoing development for third generation and beyond.  相似文献   

11.
This paper describes the security features incorporated into the third generation (3G) mobile system developed in 3GPP, specifically the enhancements to the shared secret symmetric authentication scheme as used in GSM. The proposed security architecture for the Internet multimedia subsystem (IMS) based on and built upon Internet applications, services and protocols, is then described. Finally, the paper describes some early work by 3GPP to integrate public key security mechanisms into 3G, while maintaining the global reach and call set-up performance, that mobile users now take for granted.  相似文献   

12.
移动接入系统的安全技术   总被引:1,自引:1,他引:0  
第3代移动通信系统是未来移动接入系统的发展趋势,移动IP支持是第3代移动通信系统接入Internet的关键技术。文章在对第3代移动通信系统与移动IP协议安全需求分析的基础上,详细讨论了其安全技术及其安全实现方案。  相似文献   

13.
The effects that the 5th generation mobile network (5G) bring to Internet backbone were investigated qualitatively and quantitatively.First,the challenges that the characteristics of 5G,i.e.ultra-high data rate,ultra-low latency,and ultra-large number of connections,introduce to Internet backbone in terms of traffic,latency,and security were analyzed.Second,a model was proposed to capture the characteristics of 5G users and Internet traffic with the coordination of 5G,edge computing,and cloud computing.Then,numerical simulations were used to evaluate the model.The QoS requirements that Internet backbone faces under different extent of 5G deployment were evaluated.According to the study,increment of backbone traffic,increment of the ratio of propagation delay,and movement of bandwidth bottleneck are predicted after 5G/B5G deployment.  相似文献   

14.
Third generation mobile radio systems are currently being deployed in different regions of the world. Future systems beyond the third generation are already under discussion in international bodies and forums such as ITU, WWRF and R&D programs of the European Union and in other regions. These systems will determine the research and standardization activities in mobile and wireless communication in the next years. Based on the experience from the third generation future systems will be developed mainly from the user perspective with respect to potential services and applications including traffic demands. This is directly related to the paradigm shifts from the first generation to systems beyond third generation. International bodies are already discussing basic system requirements. The basic system architecture of heterogeneous networks with different complementing access systems is from the today's perspective the most economic approach for systems beyond 3G to satisfy user and operator needs for reasonable cost. Such system architectures enable the deployment of system capacity according to the traffic requirements with the user experience ``Optimally Connected, Anywhere and Anytime' with seamless service provision between different access systems. New radio interface components with high data rate as additional components of systems beyond 3G are being proposed in international bodies. Key issues of such systems are coverage due to reduced range and the huge spectrum demand. In this paper the international context, the user perspective, revenue and traffic expectations are presented. This results in the basic system requirements and the potential system architecture of heterogeneous networks. Major challenges for the new wideband radio interfaces are the impact on range and spectrum demand. Basic investigations are presented on these issues to critically review requirements on future systems.  相似文献   

15.
5G技术浅析     
随着中国广电网络顺利拿到5G牌照以及顺利上市,未来广电在5G领域的应用将会越来越多,5G在移动领域的应用最为普及,而移动通信系统发展的最重要原因是不断变化的需求。这些需求使得移动通信所期望的需求逐步增加。最初只有语音传输的系统,随后出现了提供高质量多媒体传输和Internet连接的新系统。5G则是目前的热门话题与未来的发展趋势。在移动通信中,从1G到5G的技术发生变化所不断涌现出的新技术推动了整个社会的变革。当前的移动通信标准向其用户提供服务较为有限,还有极大的提升空间。  相似文献   

16.
Rajoria  S.  Mishra  Keshav 《Wireless Networks》2022,28(7):2901-2911

The last decade has witnessed an excessive demand for mobile traffic. Though, fifth generation (5G) networks are in the initial phase of deployment and have wide capabilities and noble features to meet the data thrust up to some extent, it’s time to think beyond 5G systems. It is being expected that next generation wireless system (6G) will entirely be automated and intelligent, and will be ubiquitous and ultra-high reliable towards connectivity to large number of devices. This paper aims towards discussing stringent requirements while focusing on key expected technologies that may shape the 6G networks. Various applications of 6G communications are then briefly outlined. At the end, paper also discusses the potential challenges for achieving the goal. These discussions will definitely open up the horizon for future research directions.

  相似文献   

17.
近年来,移动通信业务在全球范围内发展迅猛。除了通话短信等服务外,人们要求更多的多媒体服务,能满足无所不在的各种个性化的需求。即将推出的3G系统也不能满足未来用户的实际需求,国内外移动通信领域的专家已经在进行B3G/4G系统的研究和开发工作。推导了广义多载波合成滤波器组的快速实现算法,并且结合Xilinx公司Virtex-Ⅱ系列芯片的结构特点,设计出了广义多载波合成滤波器组的FPGA实现结构。  相似文献   

18.
石纯子  朱琦 《信号处理》2017,33(7):953-960
D2D(Device-to-Device)通信作为第五代移动通信(5G, 5-generation)的关键技术之一,因其高频谱效率、低能耗等优点受到广泛关注。为了更好地满足D2D用户的服务质量(quality of service, QoS)需求,本文引入用户满意度的概念,提出了一种基于QoS的分簇信道分配算法。该算法运用图论着色方法为D2D用户分配信道,可分为三个步骤:首先构建D2D用户间的干扰图,然后在保证蜂窝用户QoS需求的情况下建立D2D用户的可用颜色列表,最后为D2D用户分簇,位于同一簇内的用户可以共享信道。仿真结果表明,本文算法可以有效提高D2D用户的满意度和系统公平性。   相似文献   

19.
3G时代的移动电子商务的安全思考   总被引:1,自引:0,他引:1  
3G移动通信技术已经在国内外广泛应用,受此推动的移动电子商务用户数和应用近年来也在快速增长,但其安全问题也引起人们的高度重视。移动电子商务存在一般电子商务的安全隐患,同时也有基于自身特点的安全问题。而目前有关的安全技术和安全措施的研究和实施,将推动移动电子商务继续发展和逐渐普及。  相似文献   

20.
对3G移动通信系统的网络安全问题进行了探讨,对于中国在不远的将来将要开展的3G系统及工程的建设具有特别重要的意义。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号