This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05)
Trusted Computing-Based Security Architecture For 4G Mobile Networks
Dalian, China
December 05-December 08
ISBN: 0-7695-2405-2
Yu Zheng, Southwest Jiaotong University, Chengdu, Sichuan, China
Dake He, Southwest Jiaotong University, Chengdu, Sichuan, China
Weichi Yu, Southwest Jiaotong University, Chengdu, Sichuan, China
Xiaohu Tang, Southwest Jiaotong University, Chengdu, Sichuan, China
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security framework based on Trusted Mobile Platform (TMP) and PKI is proposed to provide a considerable robust platform for user?s access to sensitive service and data in the scenario of 4G systems. Over this framework, with the combination of password and biometric identification (BI) as well as public key-based identification, an efficient hybrid authentication and key agreement (HAKA) scheme is presented to resist the possible attacks, particularly the attacks on/from ME. Compared with 3G architecture and other security schemes for 4G mobile networks, our architecture and corresponding HAKA is more secure, scalable and convenient to support globe mobility and capable of being employed to handle the complicated security issues in 4G mobile networks.
Citation:
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang, "Trusted Computing-Based Security Architecture For 4G Mobile Networks," pdcat, pp.251-255, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05), 2005
Usage of this product signifies your acceptance of the Terms of Use.