[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/PDCAT.2005.243guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Trusted Computing-Based Security Architecture For 4G Mobile Networks

Published: 05 December 2005 Publication History

Abstract

In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security framework based on Trusted Mobile Platform (TMP) and PKI is proposed to provide a considerable robust platform for user's access to sensitive service and data in the scenario of 4G systems. Over this framework, with the combination of password and biometric identification (BI) as well as public key-based identification, an efficient hybrid authentication and key agreement (HAKA) scheme is presented to resist the possible attacks, particularly the attacks on/from ME. Compared with 3G architecture and other security schemes for 4G mobile networks, our architecture and corresponding HAKA is more secure, scalable and convenient to support globe mobility and capable of being employed to handle the complicated security issues in 4G mobile networks.

Cited By

View all
  • (2007)On the homonymous role in role-based discretionary access controlProceedings of the 4th international conference on Autonomic and Trusted Computing10.5555/2394798.2394839(313-322)Online publication date: 11-Jul-2007
  • (2007)On device authentication in wireless networksProceedings of the 4th international conference on Trust, Privacy and Security in Digital Business10.5555/2392055.2392075(135-144)Online publication date: 4-Sep-2007

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
PDCAT '05: Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
December 2005
1086 pages
ISBN:0769524052

Publisher

IEEE Computer Society

United States

Publication History

Published: 05 December 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2007)On the homonymous role in role-based discretionary access controlProceedings of the 4th international conference on Autonomic and Trusted Computing10.5555/2394798.2394839(313-322)Online publication date: 11-Jul-2007
  • (2007)On device authentication in wireless networksProceedings of the 4th international conference on Trust, Privacy and Security in Digital Business10.5555/2392055.2392075(135-144)Online publication date: 4-Sep-2007

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media