...
首页> 外文期刊>Security and communication networks >Wireless security: securing mobile UMTS communications from interoperation of GSM
【24h】

Wireless security: securing mobile UMTS communications from interoperation of GSM

机译:无线安全性:保护移动UMTS通信不受GSM互操作的影响

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Wireless communications have revolutionized the way the world communicates. An important process used to secure that communication is authentication. As flaws in the security of a wireless network are discovered, new protocols and algorithms are required to meet those security issues. When creating new algorithms and systems, it is possible that the existing equipment may not be able to implement the new protocols, which means that integration may be required to transition from an old security protocol to the new more secure protocol. Stationary wireless networks were created without a strong need to integrate protocols and have simply developed slightly more secure protocols to protect old equipment. New protocols in stationary wireless networks are implemented without integration as a requirement. Mobile wireless networks have the requirement of allowing old equipment to use the entire network as it is advantageous to allow new mobile equipment to connect to old networking equipment to increase coverage areas and for old equipment to connect to new towers for roaming and billing. This requirement for mobile networks means that integration is required. There are flaws in this integration of Global System for Mobile Communications (GSM) into Universal Mobile Telecommunications System (UMTS) networks. Those flaws are analyzed, and two practical solutions are proposed. Copyright © 2012 John Wiley & Sons, Ltd.
机译:无线通信彻底改变了世界的通信方式。用来确保通信安全的重要过程是身份验证。随着发现无线网络安全性的缺陷,需要新的协议和算法来解决这些安全性问题。当创建新的算法和系统时,现有设备可能无法实现新协议,这意味着可能需要集成才能从旧的安全协议过渡到新的更安全的协议。创建固定无线网络时无需强烈集成协议,而只是开发了稍微更安全的协议来保护旧设备。无需集成即可实现固定无线网络中的新协议。移动无线网络具有允许旧设备使用整个网络的要求,因为有利的是允许新移动设备连接到旧网络设备以增加覆盖范围,并且允许旧设备连接到新塔以进行漫游和计费。移动网络的这一要求意味着需要集成。将全球移动通信系统(GSM)集成到通用移动电信系统(UMTS)网络中存在缺陷。分析了这些缺陷,并提出了两种实用的解决方案。版权所有©2012 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号