PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

New Trends in Femtocell Backhaul Security

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
PL
Nowe trendy w ochronie danych w komunikacji femtokomórek
Języki publikacji
EN
Abstrakty
EN
One of the relatively new services presented by mobile operators is a femtocell. A femtocell is a network located at the residential premises helping to extend the mobile signal to places which are difficult to cover. Furthermore, it enables the mobile operator to provide attractive service to the customer since the femtocell is connected to the mobile operator network using an IP based backhaul link over the public Internet. To ensure appropriate security over the untrustworthy environment, an IPsec tunnel is established between the femtocell access point and the provider’s security gateway located at the core network perimeter. IPsec itself wasn’t originally proposed to carry small voice packets resulting in a redundant overhead. This paper examines other security procedures, such as transport layer security (TLS) and Datagram TLS (DTLS) protocols.
PL
W artykule zaprezentowano porównanie systemów ochrony pakietów danych w sieci komunikacji femtokomórek. W celu nawiązania i zabezpieczenia połączenia zastosowano tu tunelowanie IPsec między bramką operatora, a odbiornikiem, femtokomórką. Testom poddano procedury ochrony w protokołach TLS oraz DTLS.
Słowa kluczowe
EN
security   network   femtocell   protocol   IPsec   TLS   DTLS   SRTP   ZRTP  
PL
ochrona   sieć   femtokomórka   protokół   IPsec   TLS   DTLS   SRTP   ZRTP  
Rocznik
Strony
240--244
Opis fizyczny
Bibliogr. 23 poz., rys., schem., tab., wykr.
Twórcy
autor
  • Czech Technical University in Prague
autor
  • Czech Technical University in Prague
Bibliografia
  • [1] Chandrasekhar, V., Andrews, J. G., Gatherer, A., Femtocell Networks: A Survey. In IEEE Communications Magazine. 2008.
  • [2] Kim, R. Y., Kwak, J. S., Etemad, K., Wimax Femtocell: Requirements, Challenges, and Solutions. In IEEE Communications Magazine. 2009.
  • [3] Hasan, S. F., Siddique, N. H., Chakraborty, S., Femtocell Versus WiFi – A Survey And Comparison of Architecture and Performance. In Wireless Vitae'09. 2009.
  • [4] Security Issues in Femtocell Deployment [online]. 2008 [cit. 2011-03-28]. Available: http://www.gsmworld.com/documents/fcg0510.pdf.
  • [5] 3GPP2 S.S0132-0 “Femtocell Security Framework 1.0”, http://www.3gpp2.org/public_html/specs/S.S0132- 0_v1.0_Femtocell_Security_Framework.pdf
  • [6] Korver, B., The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2, and PKIX (RFC4945) [online]. 2007 [cit. 2011-03-28]. Available: http://tools.ietf.org/html/rfc4945.
  • [7] Kaufman, C., Internet Key Exchange (IKEv2) Protocol (RFC4306) [online]. 2005 [cit. 2011-03-28]. Available: http://tools.ietf.org/html/rfc4306.
  • [8] Black, D., McGrew, D., Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol (RFC5282) [online]. 2008 [cit. 2011-03-28]. Available: http://tools.ietf.org/html/rfc5285.
  • [9] Manral, V., Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH) (RFC4835) [online]. 2007 [cit. 2011-03-28]. Available: http://tools.ietf.org/html/rfc4835
  • [10] Dierks, T., Rescorla, E., The Transport Layer Security (TLS) Protocol Version 1.2 (RFC5246) [online]. 2008 [cit. 2011-03- 28]. Available: http://tools.ietf.org/html/rfc5246
  • [11] Rescorla, E., Modadugu, N., Datagram Transport Layer Security (RFC4347) [online]. 2006 [cit. 2011-03-28]. Available: http://tools.ietf.org/html/rfc4347.
  • [12] Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V., RTP: A Transport Protocol for Real-Time Applications (RFC3550) [online]. 2003 [cit. 2011-03-28]. Available: http://tools.ietf.org/html/rfc3550.
  • [13] Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K., The Secure Real-time Transport Protocol (SRTP) (RFC3711) [online]. 2004 [cit. 2011-03-28]. Available: http://tools.ietf.org/html/rfc3711.
  • [14] Zimmermann, P., Callas, J., Johnston, A. ZRTP: Extensions to RTP for Diffie-Hellman Key Agreement for SRTPdraftzimmermann- avt-zrtp-01. (RFC Draft) [online]. 2006 [cit. 2011- 03-28]. Available: http://tools.ietf.org/html/draft-zimmermannavt- zrtp-01.
  • [15] Simena Network Emulator NE2000, [online]. 2010 [cit. 2011- 03-28]. Available: http://simena.net/products/networkemulator- 2/
  • [16] Andreasen, F., Baugher, M., Wing, D., Session Description Protocol (SDP) Security Descriptions for Media Streams (RFC 4568), IETF, 2006, [online], http://tools.ietf.org/html/rfc4568
  • [17] Arkko, J., Carrara, E., Lindholm, F., Naslund, M., Norrman, K., MIKEY: Multimedia Internet KEYing (RFC 3830), IETF, 2004, [online], http://tools.ietf.org/html/rfc3830
  • [18] Zimmermann, P., Callas, J., Johnston, A., Ed., ZRTP: Media Path Key Agreement for Unicast Secure RTP (RFC 6189), IETF, 2011, [online] http://tools.ietf.org/html/rfc6189, ISSN: 2070-1721
  • [19] McGrew, D., Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP) (RFC 5764), IETF, 2010, [online], http://www.ietf.org/rfc/rfc5764.txt
  • [20] Dierks, T., Rescorla, E., The Transport Layer Security (TLS) Protocol Version 1.2 (RFC 5246), IETF, 2008, [online], http://www.ietf.org/rfc/rfc5246.txt
  • [21] Rescorla, E., Modadugu, N., Datagram Transport Layer Security version 1.2, draft-ietf-tls-rfc4347-bis-06.txt, IETF, 2011, [online], http://tools.ietf.org/html/draft-ietf-tls-rfc4347-bis- 06
  • [22] Cooper, D. et al., Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (RFC 5280), IETF, 2008, [online], http://tools.ietf.org/html/rfc5280
  • [23] Housley, R., Cryptographic Message Syntax (CMS) (RFC 5652), IETF, 2009, [online], http://tools.ietf.org/html/rfc5652
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-61fedacd-63c4-4551-a6ac-d514fe27b9a4
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.