- 易迪拓培训,专注于微波、射频、天线设计工程师的培养
移动网络安全防护技术
5 结束语
预计在不远的将来,手机终端将成为真正意义上的互联网终端。用户使用手机能实现个人电脑几乎所有的功能,如电子商务、收发邮件、手机钱包等。如果手机的安全问题得不到有效解决,将成为严重制约这些应用发展的瓶颈。
移动网络安全问题需要从整个网络出发整体考虑,将传统的由用户自行处理的终端杀毒方法转移到由网络运营商,为移动用户提供安全服务。由于运营商在技术、设施、管理等方面具有优势,能够为移动网络安全提供有力保障。
可以预见,随着移动网络安全事件的不断出现,能否为用户提供优质的安全服务,将成为移动网络运营商商业竞争能否取胜的关键。基于安全服务的整体安全解决方案,将成为未来网络信息安全的主流发展方向。
6 参考文献
[1] LEI Min, BI Hai, FENG Zhengjin. Security Architecture and Mechanism of Third Generation Mobile Communication [C]//Proceedings of the 2002 IEEE Region 10 Conference on Conference on Computers, Communications, Control and Power Engineering (TENCON’02): Vol 2,Oct 28-31,2002, Beijing, China. Piscataway, NJ, USA: IEEE, 2002:813-816.
[2] YANG Hao, RICCIATO F, LU Songwu, et al. Securing a Wireless World [J]。 Proceedings of the IEEE, 2006,94(2): 442-454.
[3] ZHENG Yu, HE Dake, YU Weichi, et al. Trusted Computing-Based Security Architecture for 4G Mobile Networks [C]//Proceedings of the 6th International Conference on Parallel and Distributed Computing, Applications and Technologies(PDCAT’05), Dec 5-8,2005, Dalian, China. Los Alamitos, CA,USA: IEEE Computer Society, 2005:251-255.
[4] 戴沁芸, 王允非。 网络安全迎来3G时代 [J]。 信息安全与通信保密, 2010(5):34-39.
[5] AL-FAYOUMI M, NASHWAN S, YOUSEF S, et al. A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks [J]。 Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB’07), Oct 8-10, 2007, White Plains, NY, USA. Piscataway, NJ, USA: IEEE, 2007:29.
[6] AL-MUHTADI J, MICKUNAS D, ROY CAMPBELL R. A Lightweight Reconfigurable Security Mechanism for 3G/4G Mobile Devices [J]。 IEEE Wireless Communications, 2002,9(2):60-65.
[7] ZHANG Muxiang, FANG Yuguang. Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol [J]。 IEEE Transactions on Wireless Communications, 2005,4(2):734-743.
[8] DIAB W B, PRISM S. VPN Solution for Securing Voice over Third Generation Networks [C]//Proceedings of the 2nd International Conference on Internet Multimedia Services Architecture and Applications (IMSAA‘08), Dec 10-12,2008, Bangalore, India. Piscataway, NJ, USA: IEEE, 2008:6p.
[9] KAMBOURAKIS G, ROUSKAS A, GRITZALIS S. Using SSL/TLS in Authentication and Key Agreement [C]//Proceedings of the 4th International Workshop on Mobile and Wireless Communications Network (MWCN’02), Sep 9-11,2002, Stockholm, Sweden. Piscataway, NJ, USA: IEEE, 2002: 152-156.
[10] AIASH M, MAPP G, LASEBAE A, et al. Providing Security in 4G Systems: Unveiling the Challenges [C]//Proceedings of the 6th Advanced International Conference on Telecommunications (AICT‘10), May 9-15, 2010, Barcelona, Spain. Los Alamitos, CA, USA: IEEE Computer Society, 2010: 439-445.
[11] DENG Yaping, FU Hong, XIE Xianzhong, et al. A novel 3GPP SAE Authentication and Key Agreement Protocol [C]//Proceedings of the 2009 IEEE International Conference on Network Infrastructure and Digital Content(IC-NIDC’09), Nov 6-8,2009, Beijing, China. Piscataway, NJ, USA: IEEE 2009:557-561.
[12] 陆峰, 郑康锋, 钮心忻, 等。 3GPP认证与密钥协商协议安全性分析 [J]。 软件学报, 2010,21(7): 1768-1782.
[13] 汪欣荣。 基于IPSec VPN的手机安全系统研究 [J]。 计算机安全, 2009(1):52-54.
[14] 刘威鹏, 胡俊, 方艳湘, 等。 基于可信计算的终端安全体系结构研究与进展 [J]。 计算机科学, 2007, 34(10): 257-269.
[15] 吕海军, 陈前斌, 吴小平。 智能手机病毒的发展及其对策研究 [J]。 信息安全与通信保密, 2008, 30(1):80-82.
[16] 黄丹, 桑梓勤。 移动通信网络病毒防治方案浅析 [J]。 光通信研究, 2008(2):39-43.
[17] 吴振强, 马建峰。 基于TPM的移动互联网络可信体系架构研究 [J]。 网络安全技术与应用, 2007(11):18-20.
[18] NTT, DoCoMo, IBM, et al. Trusted Mobile Platform Hardware Architecture Description [EB/OL]。 [2004-10-27]。 http://www.trusted-mobile.org/TMP_HWAD_revl_00.pdf.
[19] HALFHIL T R. ARM DonsArmor - TrustZone Security Extensions Strengthen ARMv6 Architecture [R]。 Microprocessor Report, 2003.
1 2 3 4
上一篇:路由器死机掉线问题原因分析
下一篇:基于无线传感器网络的远程智能抄表系统设计(
)