Trusted computing-based security architecture for 4G mobile networks

被引:0
|
作者
Zheng, Y [1 ]
He, DK [1 ]
Yu, WC [1 ]
Tang, XH [1 ]
机构
[1] SW Jiaotong Univ, Sch Info Sci & Tech, Chengdu, Sichuan, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security framework based on Trusted Mobile Platform (TMP) and PKI is proposed to provide a considerable robust platform for user's access to sensitive service and data in the scenario of 4G systems. Over this framework, with the combination of password and biometric identification (BI) as well as public key-based identification, an efficient hybrid authentication and key agreement (HAKA) scheme is presented to resist the possible attacks, particularly the attacks on/from ME. Compared with 3G architecture and other security schemes for 4 mobile networks, our architecture and corresponding HAKA is more secure, scalable and convenient to support globe mobility and capable of being employed to handle the complicated security issues in 4G mobile networks.
引用
收藏
页码:251 / 255
页数:5
相关论文
共 50 条
  • [1] Distributed Security Architecture for Authentication in 4G Networks
    Niranjani, D.
    Durga, M. Ganaga
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 286 - 291
  • [2] Mobile Security and Trusted Computing
    Mitchell, Chris
    [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
  • [3] A Novel Mobile Edge Computing-based Architecture for Future Cellular Vehicular Networks
    Li, Liang
    Li, Yunzhou
    Hou, Ronghui
    [J]. 2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [5] 4G mobile network architecture
    Ikkelä, K
    Myllynen, M
    Heinänen, J
    Martikainen, O
    [J]. EMERGING PERSONAL WIRELESS COMMUNICATIONS, 2001, 67 : 183 - 195
  • [6] An Efficient Security Architecture for Trusted Computing
    Yin Zhixi
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
  • [7] DESIGN AND IMPLEMENTATION OF TRUSTED COMPUTING-BASED MUTUAL AUTHENTICATION MODEL FOR MOBILE TERMINAL
    Ma, Zhuo
    Lin, Wei-min
    Zhang, Tao
    Deng, Song
    [J]. 2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 309 - 313
  • [8] Mobile Networks Beyond 4G
    Frank, Hilary
    [J]. WORLD CONGRESS ON ENGINEERING, WCE 2015, VOL I, 2015, : 649 - 652
  • [9] Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks
    Lanoue, Matthew J.
    Michael, James Bret
    Bollmann, Chad A.
    [J]. 2021 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2021,
  • [10] Based on Trusted Computing Solutions for Mobile Payment Terminal Security
    Yu, Haiyong
    Li, Peng
    [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574