Wireless network security architecture

被引:4
|
作者
Blumenthal, U [1 ]
Marcovici, M [1 ]
Mizikovsky, S [1 ]
Patel, S [1 ]
Sundaram, GS [1 ]
Wong, M [1 ]
机构
[1] Lucent Technol, Wireless Secure Commun & Fraud Anal Grp, Whippany, NJ USA
关键词
D O I
10.1002/bltj.10003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cellular bandits have exploited security limitations of analog technology from its infancy. First-generation analog system security has been primarily left up to system manufacturers and service providers. With the advent of digital technology (second generation [2G]), the standards organizations aggressively developed techniques and cryptographic methods to protect the service provider from fraudulent use of network resources and to provide user privacy. Third-generation (3G) digital wireless systems offer significant improvement of security techniques that address all known 2G deficiencies and allow strong service protection for many years to come. This paper discusses in detail the wireless security architecture evolution (voice and data) with special emphasis on the latest standards developed for 3G wireless systems, including 2G13G interoperability issues. Both the Universal Mobile Telecommunications System (developed by the 3rd Generation Partnership Project [3GPP]) and CDMA2000* (developed by the 3rd Generation Partnership Project 2 [3GPP2]) architectures are addressed. (C) 2002 Lucent Technologies Inc.
引用
收藏
页码:19 / 36
页数:18
相关论文
共 50 条
  • [31] Extending the TLS Protocol by EAP Handshake to Build a Security Architecture for Heterogenous Wireless Network
    Grochla, Krzysztof
    Stolarz, Piotr
    [J]. COMPUTER NETWORKS, CN 2013, 2013, 370 : 258 - 267
  • [32] Hierarchical wireless network architecture for factory network
    Sungnam Moom
    Younghan Kim
    [J]. Journal of Measurement Science and Instrumentation, 2012, 3 (02) : 163 - 168
  • [33] Security Architecture for Broadband Multicast Wireless Networks
    Wei, Zheng
    Xin, Meng
    Jiang Li-zheng
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4809 - 4812
  • [34] SecSens - Security Architecture for Wireless Sensor Networks
    Bagci, Faruk
    Ungerer, Theo
    Bagherzadeh, Nader
    [J]. 2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 449 - +
  • [35] A security architecture for mobile wireless sensor networks
    Schmidt, S
    Krahn, H
    Fischer, S
    Wätjen, D
    [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 166 - 177
  • [36] Security Architecture and Requirements for Wireless Sensor Networks
    Gong, Yiguang
    Ruan, Feng
    Fan, Zhiyong
    Hou, Jianmin
    Mei, Ping
    Li, Tao
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 295 - 302
  • [37] A security architecture for wireless ad hoc networks
    Candolin, C
    Kari, HH
    [J]. 2002 MILCOM PROCEEDINGS, VOLS 1 AND 2: GLOBAL INFORMATION GRID - ENABLING TRANSFORMATION THROUGH 21ST CENTURY COMMUNICATIONS, 2002, : 1095 - 1100
  • [38] Wireless Body Area Network (WBAN): A Survey on Architecture, Technologies, Energy Consumption, and Security Challenges
    Yaghoubi, Mohammad
    Ahmed, Khandakar
    Miao, Yuan
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (04)
  • [39] Router architecture evaluation for security network
    Yungho Choi
    Lark-Kyo Kim
    Hyungkeun Ahn
    Neungsoo Park
    [J]. Peer-to-Peer Networking and Applications, 2014, 7 : 628 - 635
  • [40] Security-Oriented Network Architecture
    Jiang, Weiyu
    Liu, Bingyang
    Wang, Chuang
    Yang, Xue
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021