ZTE Communications ›› 2011, Vol. 9 ›› Issue (3): 49-54.

• Research Paper • Previous Articles     Next Articles

Security Service Technology for Mobile Networks

Aiqun Hu, Tao Li, and Mingfu Xue   

  1. Information Security Research Center of Southeast University, Nanjing 210096, P. R. China
  • Online:2011-09-25 Published:2011-09-25
  • About author:Aiqun Hu (aqhu@seu.edu.cn) is director of the Information Security Research Centre of Southeast University, China. He is also a professor and doctoral advisor. His research interests include wireless networks and their security technologies.

    Tao Li (leotao1984@hotmail.com) is studying for his doctoral degree at the School of Information Science and Engineering of Southeast University, China. His research direction is trusted computing technologies for mobile networks.

    Mingfu Xue (57233806@163.com) is studying for his doctoral degree at the School of Information Science and Engineering of Southeast University, China. His research direction is trusted computing technologies for mobile networks.
  • Supported by:
    This work is funded by the National High-Technology Research and Development Program of China ( “863”Program) under Grant No. 2009AA01Z427.

Abstract: As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development.

Key words: mobile network security, security service, trusted computing, access control