Trusted computing-based security architecture for 4G mobile networks

被引:0
|
作者
Zheng, Y [1 ]
He, DK [1 ]
Yu, WC [1 ]
Tang, XH [1 ]
机构
[1] SW Jiaotong Univ, Sch Info Sci & Tech, Chengdu, Sichuan, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security framework based on Trusted Mobile Platform (TMP) and PKI is proposed to provide a considerable robust platform for user's access to sensitive service and data in the scenario of 4G systems. Over this framework, with the combination of password and biometric identification (BI) as well as public key-based identification, an efficient hybrid authentication and key agreement (HAKA) scheme is presented to resist the possible attacks, particularly the attacks on/from ME. Compared with 3G architecture and other security schemes for 4 mobile networks, our architecture and corresponding HAKA is more secure, scalable and convenient to support globe mobility and capable of being employed to handle the complicated security issues in 4G mobile networks.
引用
收藏
页码:251 / 255
页数:5
相关论文
共 50 条
  • [21] Cyber security considerations of 4G mobile networks as a commuication service in smart grid
    Rahmani, Masoomeh
    Mozafari, Azam
    Pedramnia, Kiana
    [J]. 2021 11TH SMART GRID CONFERENCE (SGC), 2021, : 305 - 309
  • [22] Research on Smart Mobile Terminal Security Technology Based on Trusted Computing
    Li, Ming
    Fang, Yuan
    Liu, Jun
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3278 - 3281
  • [23] Generic system architecture for 4G mobile communications
    Gazis, V
    Housos, N
    Alonistioti, A
    Merakos, L
    [J]. 57TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, VTC 2003-SPRING, VOLS 1-4, PROCEEDINGS, 2003, : 1512 - 1516
  • [24] A Conceptual Architecture for Advanced Location Based Services in 4G Networks
    Zhang Yun
    Gao Ren
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 6525 - +
  • [25] Fog Computing-Based Intrusion Detection Architecture to Protect IoT Networks
    Labiod, Yasmine
    Korba, Abdelaziz Amara
    Ghoualmi, Nacira
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 125 (01) : 231 - 259
  • [26] Fog Computing-Based Intrusion Detection Architecture to Protect IoT Networks
    Yasmine Labiod
    Abdelaziz Amara Korba
    Nacira Ghoualmi
    [J]. Wireless Personal Communications, 2022, 125 : 231 - 259
  • [27] Beyond 3G: 4G IP-Based-Mobile networks
    O'Mahony, D
    Doyle, L
    [J]. WIRELESS IP AND BUILDING THE MOBILE INTERNET, 2003, : 87 - 103
  • [28] 4G Protocol and Architecture for BYOD Over Cloud Computing
    Bhat, Aparna
    Gojanur, Vishwanath
    Hegde, Rajeshwari
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 308 - 313
  • [29] A Mobile Edge Computing-Based Architecture for Improved Adaptive HTTP Video Delivery
    Li, Yue
    Frangoudis, Pantelis A.
    Hadjadj-Aoul, Yassine
    Bertin, Philippe
    [J]. 2016 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2016,
  • [30] Security Advances and Challenges in 4G Wireless Networks
    Seddigh, N.
    Nandy, B.
    Makkar, R.
    Beaumont, J. F.
    [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 62 - 71