Wireless network security architecture

被引:4
|
作者
Blumenthal, U [1 ]
Marcovici, M [1 ]
Mizikovsky, S [1 ]
Patel, S [1 ]
Sundaram, GS [1 ]
Wong, M [1 ]
机构
[1] Lucent Technol, Wireless Secure Commun & Fraud Anal Grp, Whippany, NJ USA
关键词
D O I
10.1002/bltj.10003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cellular bandits have exploited security limitations of analog technology from its infancy. First-generation analog system security has been primarily left up to system manufacturers and service providers. With the advent of digital technology (second generation [2G]), the standards organizations aggressively developed techniques and cryptographic methods to protect the service provider from fraudulent use of network resources and to provide user privacy. Third-generation (3G) digital wireless systems offer significant improvement of security techniques that address all known 2G deficiencies and allow strong service protection for many years to come. This paper discusses in detail the wireless security architecture evolution (voice and data) with special emphasis on the latest standards developed for 3G wireless systems, including 2G13G interoperability issues. Both the Universal Mobile Telecommunications System (developed by the 3rd Generation Partnership Project [3GPP]) and CDMA2000* (developed by the 3rd Generation Partnership Project 2 [3GPP2]) architectures are addressed. (C) 2002 Lucent Technologies Inc.
引用
收藏
页码:19 / 36
页数:18
相关论文
共 50 条
  • [1] An Enhanced Security Architecture for Wireless Sensor Network
    Youssef, Sherin M.
    Mohamed, A. Baith
    Mikhail, Mark A.
    [J]. PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON DATA NETWORKS, COMMUNICATIONS, COMPUTERS (DNCOCO '09), 2009, : 216 - 224
  • [2] Converged wireless network architecture for homeland security
    Balachandran, Krishna
    Budka, Kenneth C.
    Chu, Thomas P.
    Doumi, Tewfik L.
    Kang, Joseph H.
    Whinnery, Robert
    [J]. MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 630 - 634
  • [3] A Wireless Sensor Network Architecture for Homeland Security Application
    Grilo, Antonio
    Piotrowski, Krzysztof
    Langendoerfer, Peter
    Casaca, Augusto
    [J]. AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2009, 5793 : 397 - +
  • [4] Wireless biomedical home security network -: architecture and modelling
    Volner, R
    Lubomír, P
    [J]. 38TH ANNUAL 2004 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2004, : 69 - 76
  • [5] Optimization of Wireless Sensor Network Architecture with Security System
    Wang, Shanshan
    Chen, Yun
    [J]. JOURNAL OF SENSORS, 2021, 2021
  • [6] An Architecture Design for Wireless Authentication Security in Bluetooth Network
    Mandal, Bijoy Kumar
    Bhattacharyya, Debnath
    Kim, Tai-Hoon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 1 - 8
  • [7] Security architecture based on immunity principle for wireless sensor network
    Li, Yu-Ying
    Dong, Xiao-Mei
    Li, Xiao-Hua
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2010, 31 (SUPPL. 2): : 197 - 200
  • [8] Wireless sensor network security: A secure sink node architecture
    Muhammad, S
    Furqan, Z
    Guha, R
    [J]. CONFERENCE PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 2005, : 371 - 376
  • [9] Security Architecture for IEEE 802.15.4-based Wireless Sensor Network
    Shon, Taeshik
    Koo, Bonhyun
    Choi, Hyohyun
    Park, Yongsuk
    [J]. ISWPC: 2009 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, 2009, : 294 - 298
  • [10] Wireless network security
    Shen, XMS
    Lin, CA
    Sun, YL
    Pan, JP
    Langendoerfer, P
    Cao, ZF
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (03): : 269 - 271