首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 296 毫秒
1.
3G移动通信系统的安全体系与防范策略   总被引:3,自引:0,他引:3  
引言 到目前为止,移动通信的发展历程大致经历了三代.第一代模拟蜂窝移动通信系统(1G)几乎没有采取安全措施,移动台把其电子序列号(ESN)和网络分配的移动台识别号(MIN)以明文方式传送至网络,若二者相符,即可实现用户的接人,结果造成大量的"克隆"手机,使用户和运营商深受其害;第二代数字蜂窝移动通信系统(2G)主要有基于时分多址(TDMA)的GSM系统,DAMPS系统及基于码分多址(CDMA)的CDMA one系统,这两类系统安全机制的实现有很大区别,但都是基于私钥密码体制,采用共享秘密数据(私钥)的安全协议,实现对接入用户的认证和数据信息的保密,在身份认证及加密算法等方面存在着许多安全隐患;第三代移动通信系统(3G)在2G的基础上进行了改进,继承了2G系统安全的优点,同时针对3G系统的新特性,定义了更加完善的安全特征与安全服务.  相似文献   

2.
本文简单回顾了第一、二代移动通信系统的安全机制,详细分析了第三代移动通信系统的安全机制,并在此基础上,对3G及后3G系统中可能存在的安全弱点及威胁作了较深入的探讨。  相似文献   

3.
黄超 《通信技术》2011,44(3):90-92
第三代移动通信系统(3G)全球范围内有广泛的应用,因此,为了保证3G通信网络安全有序地运行,有必要深入研究3G通信网络的安全机制;在阐述了信息安全理论基础上,设计了3G通信网络的安全体系结构,然后对网络接入安全机制进行了重点分析,最后重点介绍了第三代移动通信系统的认证与协商机制;这种安全机制在实践中的大量应用表明这里分析的3G通信网络安全机制有效、可行。  相似文献   

4.
罗宏  劳松均 《广东通信技术》2003,23(3):14-15,18
在第三代移动通信系统展开应用的同时,关于第四代移动通信系统的讨论也巳全面展开。本文先介绍移动通信发展的现状,然后对3G和4G系统进行比较,讨论4G里的一些关键技术,最后对第四代移动通信系统的发展进行了展望。  相似文献   

5.
简述3G(第三代移动通信系统)概况及其体制标准,介绍3G发展现状及主流应用技术,分析探讨了2G(第二代移动通信系统)向3G演进的方式。  相似文献   

6.
数字蜂窝移动通信系统安全技术的探讨与分析   总被引:7,自引:0,他引:7  
由于空中接口的开放性,移动通信尤其是数字蜂窝移动通信系统中的安全性能一直是用户所关注的焦点。本文探讨和分析了当前第二代数字蜂窝移动通信系统中的两大有代表性的安全技术及其性能。其次,分析了如何在移动通信网中利用入侵检测系统来检测非法用户和不诚实的合法用户对网络资源的盗用与滥用以及如何设计入侵检测系统。最后,对2G与3T移动通信系统的安全技术进行了比较。  相似文献   

7.
未来移动通信系统中的无线资源管理   总被引:2,自引:0,他引:2  
文章结合当前正在研究的后3代(B3G),第4代(4G)移动通信系统的发展和处于运营及推广阶段的第3代移动通信系统,分析了未来移动通信系统中无线资源管理系统的关键技术,探讨了多体制标准下的无线通信网络和多种业务情况下的无线资源管理的研究方向。  相似文献   

8.
第三代移动通信系统的安全体系   总被引:2,自引:0,他引:2  
透过第三代移动通信系统的UMTS的安全原则,介绍了第三代合作项目(3GPP)的安全体系结构,讨论了第二代(2G)与第三代(3G)安全体系的区别.  相似文献   

9.
目前,飞速发展的移动通信技术已经历了三代,第三代移动通信系统(3G)技术可以提供前两代产品不能提供的各种宽带信息业务。然而,由于3G系统本身所具有的局限性,特别是3G沿用了2G网络为中心的结构,移动终端不能够智能化。因此,世界通信业界的专家们已将目光更远的放向了“后3G技术”(IMT-2000Beyond),于是在3G尚未商用化之时,4G就出现了,并大有取代3G之势头。  相似文献   

10.
当前在全球范围内,第二代(2G)移动通信系统已得到广泛应用,第三代(3G)移动通信系统已经在全球范围内逐步开始商用,但3G对数据业务的支持仍然需要进一步完善。因此,在移动通信领域领先的国家和企业都已经着手研究更新的移动通信技术,以满足市场需求,抢占未来移动通信市场的份额。  相似文献   

11.
An introduction to access security in UMTS   总被引:2,自引:0,他引:2  
The first generation of cellular mobile communications systems contained few if any security measures to protect the system operator and users. The second generation generally did a lot better, and contained entity authentication and confidentiality protection. Although this was a major improvement, security protection in the second generation left a lot to be desired. With the advent of 3G mobile systems a serious effort has been made to create a consistent security architecture based on the threats and risks a 3G system faces.  相似文献   

12.
The User-level Security of Mobile Communication Systems   总被引:2,自引:0,他引:2  
1 IntroductionBoththefixedtelephonenetworkandthemo bilesystems (e .g .,GSM )arebeingusedincreas inglyfornotonlyspeechandfaxcommunicationbutalsoInternetservice .ThedemandforthefixedIn ternetservice ,namelytheWorldWideWeb(WWW ) ,hasbeenspectacular.Theserviceisnow…  相似文献   

13.
The development of radio networks has brought the problem of security specifically related to mobility of terminals sharply into focus, and has created the need for radio network operators to implement new security functionalities. The security level of the analog radio mobile systems (the so-called “first generation ” systems was very low, and these systems were often exposed to massive fraud. The development of digital radio mobile systems (the so-called “second generation” systems: GSM, DECT,. allowed the systematic introduction of cryptology based protection mechanisms. Hence, for gsm networks for instance, the main fraud and confidentiality problems were taken into account at the design stage and a security architecture was implemented to provide security services to users and network operators. The third generation mobile telecommunication systems belonging to the imt- 2000 family (which are still under specification within standardisation bodies in particular within the 3gpp worldwide third generation partnership project) will, in the forthcoming years, provide a wide variety of services on a single terminal in a multi-environment (domestic, public, business), multi-operator, and multi-service provider context. Security will be based on second generation systems security functions that have proved to be needed and reliable, and shall be adapted and improved to resolve security threats underlying to new services supplied by third generation radio systems. This document presents examples of security solutions currently implemented for protecting second generation radio mobile systems against frauds and attacks and gives an overview of potential solutions for protecting future third generation radio mobile telecommunication systems.  相似文献   

14.
随着移动通信网络的不断发展,无线接人技术、终端技术、网络技术和业务平台技术正向异构化、多样化和泛在化的趋势发展。下一代移动通信网络具有开放、灵活、可管理、移动的网络架构特点,因此其安全问题将比以往移动通信系统更加复杂。文章从下一代移动通信网络的组网结构人手,结合第二代及第三代移动通信系统存在的安全问题,分析下一代移动通信网络所面临的安全威胁,论述了其应具有的安全体系结构。  相似文献   

15.
A lightweight reconfigurable security mechanism for 3G/4G mobile devices   总被引:1,自引:0,他引:1  
Wireless communications are advancing rapidly. We are currently on the verge of a new revolutionary advancement in wireless data communications: the third generation of mobile telecommunications. 3G promises to converge mobile technology with Internet connectivity. Wireless data, multimedia applications, and integrated services will be among the major driving forces behind 3G. While wireless communications provide great flexibility and mobility, they often come at the expense of security. This is because wireless communications rely on open and public transmission media that raise further security vulnerabilities in addition to the security threats found in regular wired networks. Existing security schemes in 2G and 3G systems are inadequate, since there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism that can evolve as fast as mobile hosts are evolving into full-fledged IP-enabled devices. We propose a lightweight, component-based, reconfigurable security mechanism to enhance the security abilities of mobile devices.  相似文献   

16.
高明 《通信技术》2010,43(8):167-168
3G移动通信系统是在2G移动通信系统的基础上发展起来的宽带移动通信系统,随着中国3G商用网络的启动和3G手机的上市应用,3G手机以其强大功能给人们带来全新的通信与信息服务享受;同时,其信息安全缺乏有效的技术防护手段等问题,给新形势下的安全保密工作构成了新的威胁和挑战。分析了3G手机的主要功能及安全隐患,从保密教育、技术防范和场所管理等三方面提出了做好信息安全防范的对策措施,以防止失泄密问题的发生。  相似文献   

17.
Following the phenomenal success of second generation global system for mobile communications (GSM) systems, the world has turned its attention to third generation mobile systems (3G). New radio spectrum has been allocated for these networks and over the last 12 months there has been global activity to license this spectrum. Licences have been awarded in a number of ways including 'beauty contests' and (often costly) auctions. Technologists have joined forces to specify the standards for 3G. This paper describes the drivers for 3G and the commercial model that is emerging. The benefits that 3G technology will provide for business and consumer products are identified. A component-based approach to application and product development is described, based on the important value add features of mobile systems. Finally, mobile terminals, billing and payment, and customer care are also considered as they are vital to the overall customer experience.  相似文献   

18.
第五代移动通信系统(5G)正用新兴的技术体系推动着万物互联,构筑起经济社会全面数字化转型的关键信息基础设施,推动全球数字经济发展。5G供应链安全事关国家核心利益和国家安全,已引起各国的重视,为此针对5G供应链特点分析5G供应链安全风险,提出5G网络供应链安全评估模型和指标体系,以支撑5G供应链中断风险的评估,为5G关键信息基础设施的行业监管部门、运营者、设备制造企业的供应链安全评估提供参考,以提升5G供应链安全防护能力,确保5G健康发展,促进国家数字经济发展。  相似文献   

19.
李晶  冯忞 《电信快报》2005,(10):52-54
安全问题是移动通信中的重要问题。3G的安全技术是在全球移动通信系统(GSM)的安全基础上建立起来的,它克服了一些GSM中的安全问题,也增加了新的安全功能。从整体的角度对3G安全体系进行分析,对未来移动通信的发展具有一定的指导意义。文章在简要介绍了移动通信的安全技术发展后,详细给出了3G安全体系的定义,包括安全目标、模型和各功能实体等,并系统地分析了3G安全体系结构、技术和特点。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号