Skip to main content
Top

2018 | OriginalPaper | Chapter

7. Security of Dedicated Mobile Communications for Railway

Authors : Zhang-Dui Zhong, Bo Ai, Gang Zhu, Hao Wu, Lei Xiong, Fang-Gang Wang, Lei Lei, Jian-Wen Ding, Ke Guan, Rui-Si He

Published in: Dedicated Mobile Communications for High-speed Railway

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter covers security schemes of dedicated mobile communications for railway. Due to the control signal is transmitted via wireless channel, communication security is crucial to the whole rail transit system. Although currently the mobile communication infrastructure in railway is based on public cellular mobile communications, considering the rail transit has characteristics of ultra-high moving velocity and high reliability and safety demand, traditional security mechanism is unable to satisfy the basic requirements of the rail transit scenario. On the one hand, there are still some threats remained in GSM-R. On the other hand, the future dedicated mobile network for railway is heterogeneous and complicated, including 2G, 3G, 4G, WLAN networks, and mobile relays. How to achieve fast authentic handover scheme across domains is a problem that must be solved. In this chapter, we first introduce the security problems in mobile communications. Next, we describe in detail the key improvements of railway communication technology. Finally, we introduce some key technologies in heterogeneous network environment and give a brief prospect of the future research.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Xu S, Ma W, Wang X (2003) Security technology in wireless communication network. Posts and Telecom Press, Beijing, pp. 36–41 Xu S, Ma W, Wang X (2003) Security technology in wireless communication network. Posts and Telecom Press, Beijing, pp. 36–41
2.
go back to reference Vines RD (2002) Wireless security essentials: defending mobile systems from data piracy. Wiley Publishing, New York Vines RD (2002) Wireless security essentials: defending mobile systems from data piracy. Wiley Publishing, New York
3.
go back to reference Maxim M, Pollino D (2002) Wireless security. McGraw-Hill, Maidenhead Maxim M, Pollino D (2002) Wireless security. McGraw-Hill, Maidenhead
4.
go back to reference Liu Y, Fan Z (2004) Analyses and countermeasures of GSM—R network security. Railw Signal Commun Eng 6:27–30 Liu Y, Fan Z (2004) Analyses and countermeasures of GSM—R network security. Railw Signal Commun Eng 6:27–30
5.
go back to reference Song Y, Zhou K, Yao B, Chen X (2010) A GSM/UMTS Selective Jamming System. International Conference on Multimedia Information Networking and Security Song Y, Zhou K, Yao B, Chen X (2010) A GSM/UMTS Selective Jamming System. International Conference on Multimedia Information Networking and Security
6.
go back to reference Zhang M, Fang Y (2005) Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Trans Wirel Commun 1(12):734–742CrossRef Zhang M, Fang Y (2005) Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Trans Wirel Commun 1(12):734–742CrossRef
7.
go back to reference Wu H, Shi X, Gu Y (2009) Research and improvement on security of GSM-R system. J Beijing Jiaotong Univ 33(2):127–1301 Wu H, Shi X, Gu Y (2009) Research and improvement on security of GSM-R system. J Beijing Jiaotong Univ 33(2):127–1301
8.
go back to reference Zeidler HM (1986) End-to-end encryption system and method of operation. US, US 4578530 A Zeidler HM (1986) End-to-end encryption system and method of operation. US, US 4578530 A
9.
go back to reference Al-Fayoumi MA, Shilbayeh NF (2014) Cloning sim cards usability reduction in mobile networks. J Network System Management 22(2):259–279 Al-Fayoumi MA, Shilbayeh NF (2014) Cloning sim cards usability reduction in mobile networks. J Network System Management 22(2):259–279
10.
go back to reference Wu H, Gu YH, Zhong ZD (2013) One type of GSM-R fast handover algorithm for high-speed railway. In: IET, international conference on wireless, Mobile and Multimedia Networks, IET, pp.175–178 Wu H, Gu YH, Zhong ZD (2013) One type of GSM-R fast handover algorithm for high-speed railway. In: IET, international conference on wireless, Mobile and Multimedia Networks, IET, pp.175–178
11.
go back to reference Black J, Halevi S, Krawczyk H, Krovetz T, Rogaway P (1999) UMAC: fast and secure message authentication. In: Advances in cryptology - CRYPTO '99, international cryptology conference, Santa Barbara, California, Usa, August 15–19, 1999, Proceedings (Vol.1666, pp.216–233), DBLP Black J, Halevi S, Krawczyk H, Krovetz T, Rogaway P (1999) UMAC: fast and secure message authentication. In: Advances in cryptology - CRYPTO '99, international cryptology conference, Santa Barbara, California, Usa, August 15–19, 1999, Proceedings (Vol.1666, pp.216–233), DBLP
12.
go back to reference Asokan N, Ekberg JE, Kostiainen K, Rajan A, Rozas C, Sadeghi AR et al (2014) Mobile trusted computing. Proceed IEEE 102(8):1189–1206 Asokan N, Ekberg JE, Kostiainen K, Rajan A, Rozas C, Sadeghi AR et al (2014) Mobile trusted computing. Proceed IEEE 102(8):1189–1206
13.
go back to reference Madlmayr G (2008) A mobile trusted computing architecture for a near field communication ecosystem. In: iiWAS'2008 - The tenth international conference on information integration and web-based applications services, 24–26 November 2008, Linz, Austria (pp.563–566), DBLP Madlmayr G (2008) A mobile trusted computing architecture for a near field communication ecosystem. In: iiWAS'2008 - The tenth international conference on information integration and web-based applications services, 24–26 November 2008, Linz, Austria (pp.563–566), DBLP
14.
go back to reference Chengdu (2006) Trusted computing based user authentication for mobile equipment. Chinese J Comput 29(8):1255–1264 Chengdu (2006) Trusted computing based user authentication for mobile equipment. Chinese J Comput 29(8):1255–1264
Metadata
Title
Security of Dedicated Mobile Communications for Railway
Authors
Zhang-Dui Zhong
Bo Ai
Gang Zhu
Hao Wu
Lei Xiong
Fang-Gang Wang
Lei Lei
Jian-Wen Ding
Ke Guan
Rui-Si He
Copyright Year
2018
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-54860-8_7