Security in third Generation Mobile Networks

被引:32
|
作者
Xenakis, C [1 ]
Merakos, L [1 ]
机构
[1] Univ Athens, Dept Informat & Telecommun, Commun Networks Lab, GR-15784 Athens, Greece
关键词
mobile security; universal mobile telecommunication system; authentication; virtual private network;
D O I
10.1016/j.comcom.2003.12.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last few years, we have witnessed an explosion in demand for security measures motivated by the proliferation of mobile/wireless networks, the fixed-mobile network convergence, and the emergence of new services, such as e-commerce. 3G-systems play a key role in this network evolution, and, thus, all stakeholders are interested in the security level supported in the new emerging mobile environment. This paper elaborates on the security framework in 3G mobile networks. The security requirements imposed by the different types of traffic, and by the different players involved (mobile users, serving network and service providers) are investigated. The security architecture, which comprises all the security mechanisms that are projected for the Universal Mobile Telecommunication System (UMTS) network, is analyzed. The employment of traditional security technologies, originally designed for fixed networking, such as firewalls, and static Virtual Private Network (VPN), in order to safeguard the UNITS core network from external attacks, as well as to protect user data when conveyed over the network are examined. Critical points in the 3G-security architecture that may cause network and service vulnerability are identified and discussed. Furthermore, proposals for the enhancement of the 3G-security architecture, and the provision of advanced security services to end-user data traffic within and outside the UNITS core network are discussed. The proposed enhancements can be easily integrated in the existing network infrastructure, and operate transparently to the UMTS network functionality. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:638 / 650
页数:13
相关论文
共 50 条
  • [1] Security architecture and mechanism of third generation mobile communication
    Min, L
    Hai, B
    Feng, ZJ
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 813 - 816
  • [2] Security for the core network of third generation mobile systems
    Horn, G
    Kröselberg, D
    Pütz, S
    Schmitz, R
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY ISSUES OF THE NEW CENTURY, 2001, 64 : 297 - 312
  • [3] Security for the Third Generation Mobile Radio System UMTS
    Pütz, S
    [J]. BRITISH TELECOMMUNICATIONS ENGINEERING, 1999, 18 : 33 - 37
  • [4] Service differentiation in third generation mobile networks
    Siris, VA
    Briscoe, B
    Songhurst, D
    [J]. FROM QOS PROVISIONING TO QOS CHARGING, PROCEEDINGS, 2002, 2511 : 169 - 178
  • [5] Base station positioning in third generation mobile networks
    Wu, YF
    Pierre, S
    [J]. CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 31 - 34
  • [6] A Solar Energy Solution for Sustainable Third Generation Mobile Networks
    Alsharif, Mohammed H.
    [J]. ENERGIES, 2017, 10 (04):
  • [7] Intelligent agents for resource management in third generation mobile networks
    Ryan, D
    Bigham, J
    Cuthbert, L
    Tokarchuk, L
    [J]. RESEARCH AND DEVELOPMENT IN INTELLIGENT SYSTEMS XVIII, 2002, : 149 - 160
  • [8] Evaluating location management schemes for third generation mobile networks
    Safa, H
    Pierre, S
    Conan, J
    [J]. COMPUTER COMMUNICATIONS, 2002, 25 (18) : 1711 - 1718
  • [9] Automatic security assessment for next generation wireless mobile networks
    Palmieri, Francesco
    Fiore, Ugo
    Castiglione, Aniello
    [J]. MOBILE INFORMATION SYSTEMS, 2011, 7 (03) : 217 - 239
  • [10] Real-time charging in third-generation mobile networks
    Ary, BD
    Debrei, G
    Imre, S
    [J]. ConTEL 2005: Proceedings of the 8th International Conference on Telecommunications, Vols 1 and 2, 2005, : 239 - 245