论文部分内容阅读
As mobile networks become high speed and attain an all-IP structure,more services are possible.This brings about many new security requirements that traditional security programs cannot handle.This paper analyzes security threats and the needs of 3G/4G mobile networks,and then proposes a novel protection scheme for them based on their whole structure.In this scheme,a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control.At the security management center,security services such as validity verification and integrity check are provided to mobile terminals.In this way,terminals and the network as a whole are secured to a much greater extent.This paper also highlights problems to be addressed in future research and development.
As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs can not handle. This paper analyzes security threats and the needs of 3G / 4G mobile networks, and then Novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent.This paper also highlights problems be be addressed in future research and development.