期刊文献+

3G背景下异构互连网络的中间人攻击

The Man-in-the-Middle Attack of Heterogeneous Network Interconnection in the Background of 3G
下载PDF
导出
摘要 文章介绍了2G/3G以及3G-WLAN两种异构互连网络的中间人攻击,分析了攻击的可行性,并各自讨论了相应的防御机制,最后对异构无线网络的安全做出了总结和展望。 In this paper we presented two man-in-the-middle attacks of 2G/3G and 3G-WLAN heterogeneous interconnect network,analyzed the feasibility of the attacks and discussed the defense mechanisms respectively.Finally,a summary and outlook about the security of two heterogeneous wireless networks was made.
出处 《电信科学》 北大核心 2011年第2期50-57,共8页 Telecommunications Science
基金 国家"973"重点基础研究发展规划基金资助项目(No.2006CB303000) 国家自然科学基金资助项目(No.60873231)
关键词 3G 异构互连网络 中间人攻击 3G heterogeneous interconnect network man-in-the-middle attack
  • 相关文献

参考文献26

  • 1顾奕,吴韶波.WLAN与3G的融合方案及安全性分析[J].北京机械工业学院学报,2008,23(1):42-46. 被引量:1
  • 23GPP TS 33.102 V.8.0.0. 3rd generation partnership project, technical specification group services and system aspects, 3G security,security architecture, 2008 3. 被引量:1
  • 3GPP TS GSA S3-050043. Review of recently published papers on GSM and UMTS security. Sophia Antipolis, France, 2005. 被引量:1
  • 4杨义先,钮心忻编著..无线通信安全技术[M].北京:北京邮电大学出版社,2005:334.
  • 5朱红儒编著..第三代移动通信系统安全[M].北京:电子工业出版社,2009:228.
  • 6Ulrike Meyer, Susanne Wetzel. A man-in-the-middle attack on UMTS. In:Proceedings of the 3rd ACM Workshop on Wireless Security, 2004. 被引量:1
  • 7Ulrike Meyer, Susanne Wetzel. On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks. In: Proceedings of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2004. 被引量:1
  • 8Zahra Ahmadian, Somayeh Salimi, Ahmad Salahi. Security enhancements against UMTS-GSM interworking attacks. The International Journal of Computer and Telecommunications Networking, 2010. 被引量:1
  • 9Elad Barkan, Eli Biham, Nathan Keller. Instant ciphertext-only cryptanalysis of GSM encrypted communication. Journal of Cryptology, 2008, 21 (3):392-429. 被引量:1
  • 10Mehreen Afzal, Ashraf Masood, Naveed Shehzad. Improved results on algebraic cryptanalysis of A5/2. In: Proceedings of the International Conference of Global ESecurity, Communications in Computer and Information Science, Springer-Verlag, 2008. 被引量:1

二级参考文献30

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部