Skip to main content

2013 | OriginalPaper | Buchkapitel

12. Security in Emerging 4G Networks

verfasst von : Jacques Bou Abdo, Hakima Chaouchi, Jacques Demerjian

Erschienen in: Next-Generation Wireless Technologies

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter presents emerging wireless technologies applied to the domain of healthcare, which has been identified as a very important domain of increasing interest to researchers. The chapter also provides an overview of the security issues related to these emerging technologies and networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shokri, R., Theodorakopoulos, G., Le Boudec, J., & Hubaux, J. (2011). Quantifying location privacy. In IEEE symposium on security and privacy (SP), 2011 (pp. 247–262). New York: IEEE Press. CrossRef Shokri, R., Theodorakopoulos, G., Le Boudec, J., & Hubaux, J. (2011). Quantifying location privacy. In IEEE symposium on security and privacy (SP), 2011 (pp. 247–262). New York: IEEE Press. CrossRef
2.
Zurück zum Zitat 3rd Generation Partnership Project, 3GPP TR 33.821 V9.0.0 (2009-06), 3GPP Rationale and track of security decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution (SAE) (Release 9). 3rd Generation Partnership Project, 3GPP TR 33.821 V9.0.0 (2009-06), 3GPP Rationale and track of security decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution (SAE) (Release 9).
3.
Zurück zum Zitat Mjølsnes, S., & Tsay, J. K. (2012). Computational security analysis of the UMTS and LTE authentication and key agreement protocols. arXiv:1203.3866. Mjølsnes, S., & Tsay, J. K. (2012). Computational security analysis of the UMTS and LTE authentication and key agreement protocols. arXiv:​1203.​3866.
4.
Zurück zum Zitat Nergiz, M. E., Atzori, M., & Saygin, Y. (2008). Towards trajectory anonymization: a generalization-based approach. In Proceedings of the SIGSPATIAL ACM GIS 2008 international workshop on security and privacy in GIS and LBS (pp. 52–61). New York: ACM. CrossRef Nergiz, M. E., Atzori, M., & Saygin, Y. (2008). Towards trajectory anonymization: a generalization-based approach. In Proceedings of the SIGSPATIAL ACM GIS 2008 international workshop on security and privacy in GIS and LBS (pp. 52–61). New York: ACM. CrossRef
5.
Zurück zum Zitat Sweeney, L. (2002). k-Anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570. MathSciNetMATHCrossRef Sweeney, L. (2002). k-Anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570. MathSciNetMATHCrossRef
6.
Zurück zum Zitat Terrovitis, M., & Mamoulis, N. (2008). Privacy preservation in the publication of trajectories. In 9th international conference on mobile data management, MDM’08 (pp. 65–72). New York: IEEE Press. Terrovitis, M., & Mamoulis, N. (2008). Privacy preservation in the publication of trajectories. In 9th international conference on mobile data management, MDM’08 (pp. 65–72). New York: IEEE Press.
7.
Zurück zum Zitat Truta, T. M., & Campan, A. (2007). K-anonymization incremental maintenance and optimization techniques. In Proceedings of the 2007 ACM symposium on applied computing (pp. 380–387). New York: ACM. CrossRef Truta, T. M., & Campan, A. (2007). K-anonymization incremental maintenance and optimization techniques. In Proceedings of the 2007 ACM symposium on applied computing (pp. 380–387). New York: ACM. CrossRef
8.
Zurück zum Zitat Zhang, C., & Huang, Y. (2009). Cloaking locations for anonymous location based services: a hybrid approach. GeoInformatica, 13(2), 159–182. CrossRef Zhang, C., & Huang, Y. (2009). Cloaking locations for anonymous location based services: a hybrid approach. GeoInformatica, 13(2), 159–182. CrossRef
9.
Zurück zum Zitat Zhang, X., Acıiçmez, O., & Seifert, J. P. (2007). A trusted mobile phone reference architecture via secure kernel. In Proceedings of the 2007 ACM workshop on scalable trusted computing (pp. 7–14). New York: ACM. CrossRef Zhang, X., Acıiçmez, O., & Seifert, J. P. (2007). A trusted mobile phone reference architecture via secure kernel. In Proceedings of the 2007 ACM workshop on scalable trusted computing (pp. 7–14). New York: ACM. CrossRef
10.
Zurück zum Zitat Zheng, Y., He, D., Yu, W., & Tang, X. (2005). Trusted computing-based security architecture for 4G mobile networks. In Sixth international conference on parallel and distributed computing, applications and technologies, PDCAT 2005 (pp. 251–255). New York: IEEE Press. Zheng, Y., He, D., Yu, W., & Tang, X. (2005). Trusted computing-based security architecture for 4G mobile networks. In Sixth international conference on parallel and distributed computing, applications and technologies, PDCAT 2005 (pp. 251–255). New York: IEEE Press.
11.
Zurück zum Zitat Zheng, Y., He, D., Tang, X., & Wang, H. (2005). AKA and authorization scheme for 4G mobile networks based on trusted mobile platform. In Fifth international conference on information, communications and signal processing (pp. 976–980). New York: IEEE Press. Zheng, Y., He, D., Tang, X., & Wang, H. (2005). AKA and authorization scheme for 4G mobile networks based on trusted mobile platform. In Fifth international conference on information, communications and signal processing (pp. 976–980). New York: IEEE Press.
12.
Zurück zum Zitat Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., & Tan, K. L. (2008). Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on management (pp. 121–132). New York: ACM. CrossRef Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., & Tan, K. L. (2008). Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on management (pp. 121–132). New York: ACM. CrossRef
13.
Zurück zum Zitat 3GPP TR 22.220 V11.6.0 (2012-09) 3rd Generation Partnership Project, 3GPP TR 22.220 V11.6.0 (2012-00), Service requirements for Home Node B (HNB) and Home eNode B (HeNB) (Release 11). 3GPP TR 22.220 V11.6.0 (2012-09) 3rd Generation Partnership Project, 3GPP TR 22.220 V11.6.0 (2012-00), Service requirements for Home Node B (HNB) and Home eNode B (HeNB) (Release 11).
14.
Zurück zum Zitat 3GPP TS 22.278 V8.4.0 (2007-12) 3rd Generation Partnership Project, 3GPP TS 22.278 V8.4.0 (2007-12), Service requirements for the Evolved Packet System (EPS) (Release 8). 3GPP TS 22.278 V8.4.0 (2007-12) 3rd Generation Partnership Project, 3GPP TS 22.278 V8.4.0 (2007-12), Service requirements for the Evolved Packet System (EPS) (Release 8).
15.
Zurück zum Zitat 3rd Generation Partnership Project, 3GPP TS 33.401 V11.2.0 (2011-12), 3GPP System Architecture Evolution (SAE); Security architecture (Release 11). 3rd Generation Partnership Project, 3GPP TS 33.401 V11.2.0 (2011-12), 3GPP System Architecture Evolution (SAE); Security architecture (Release 11).
16.
Zurück zum Zitat 3rd Generation Partnership Project, 3GPP TS 23.003 V11.3.0 (2012-09), 3GPP Numbering, addressing and identification (Release 11). 3rd Generation Partnership Project, 3GPP TS 23.003 V11.3.0 (2012-09), 3GPP Numbering, addressing and identification (Release 11).
17.
Zurück zum Zitat 3rd Generation Partnership Project, 3GPP TS 33.102 V11.2.0 (2012-03), 3G Security, security architecture (Release 11). 3rd Generation Partnership Project, 3GPP TS 33.102 V11.2.0 (2012-03), 3G Security, security architecture (Release 11).
18.
Zurück zum Zitat Inamura, Y., Nakayama, T., & Takeshita, A. (2005). Trusted mobile platform technology for secure terminals. NTT DoCoMo Technical Journal, 7, 25–39. Inamura, Y., Nakayama, T., & Takeshita, A. (2005). Trusted mobile platform technology for secure terminals. NTT DoCoMo Technical Journal, 7, 25–39.
19.
Zurück zum Zitat Molina, J., Lee, H., Lee, S., & Song, Z. (2006). A mobile trusted platform module (MTPM) architecture. In Proc. of 2nd workshop on advances in trusted computing (WATC06). Molina, J., Lee, H., Lee, S., & Song, Z. (2006). A mobile trusted platform module (MTPM) architecture. In Proc. of 2nd workshop on advances in trusted computing (WATC06).
20.
Zurück zum Zitat DoCoMo, Trusted Mobile Platform Network (2004). Trusted Mobile Platform: Hardware Architecture Description Rev1. 0. Trusted Computing Group. DoCoMo, Trusted Mobile Platform Network (2004). Trusted Mobile Platform: Hardware Architecture Description Rev1. 0. Trusted Computing Group.
21.
Zurück zum Zitat DoCoMo, Trusted Mobile Platform Network (2004). Trusted Mobile Platform: Software Architecture Description Rev1. 0. Trusted Computing Group. DoCoMo, Trusted Mobile Platform Network (2004). Trusted Mobile Platform: Software Architecture Description Rev1. 0. Trusted Computing Group.
22.
Zurück zum Zitat DoCoMo, Trusted Mobile Platform Network (2004). Trusted Mobile Platform: Protocol Specification Document Rev1. 0. Trusted Computing Group. DoCoMo, Trusted Mobile Platform Network (2004). Trusted Mobile Platform: Protocol Specification Document Rev1. 0. Trusted Computing Group.
23.
Zurück zum Zitat Aiash, M., Mapp, G., & Lasebae, A. (2012). A survey on authentication and key agreement protocols in heterogeneous networks. International Journal of Network Security & Its Applications, 4(4), 199–214. CrossRef Aiash, M., Mapp, G., & Lasebae, A. (2012). A survey on authentication and key agreement protocols in heterogeneous networks. International Journal of Network Security & Its Applications, 4(4), 199–214. CrossRef
24.
Zurück zum Zitat Chaouchi, H., & Laurent-Maknavicius, M. (2009). Wireless and mobile network security. New York: ISTE/Wiley. CrossRef Chaouchi, H., & Laurent-Maknavicius, M. (2009). Wireless and mobile network security. New York: ISTE/Wiley. CrossRef
25.
Zurück zum Zitat Yahiya, T. A., & Chaouchi, H. (2010). On the integration of LTE and mobile WiMAX networks. In Proceedings of 19th international conference on computer communications and networks (ICCCN) (pp. 1–5). New York: IEEE Press. Yahiya, T. A., & Chaouchi, H. (2010). On the integration of LTE and mobile WiMAX networks. In Proceedings of 19th international conference on computer communications and networks (ICCCN) (pp. 1–5). New York: IEEE Press.
26.
Zurück zum Zitat Bilogrevic, I., Jadliwala, M., & Hubaux, J. P. (2010). Security issues in next generation mobile networks: LTE and femtocells. In 2nd international femtocell workshop, Luton, UK. Bilogrevic, I., Jadliwala, M., & Hubaux, J. P. (2010). Security issues in next generation mobile networks: LTE and femtocells. In 2nd international femtocell workshop, Luton, UK.
27.
Zurück zum Zitat Freudiger, J., Shokri, R., & Hubaux, J. P. (2009). On the optimal placement of mix zones. In Privacy enhancing technologies (pp. 216–234). Berlin: Springer. CrossRef Freudiger, J., Shokri, R., & Hubaux, J. P. (2009). On the optimal placement of mix zones. In Privacy enhancing technologies (pp. 216–234). Berlin: Springer. CrossRef
28.
Zurück zum Zitat Borgaonkar, R., Redon, K., & Seifert, J. P. (2011). Security analysis of a femtocell device. In Proceedings of the 4th international conference on security of information and networks (pp. 95–102). New York: ACM. Borgaonkar, R., Redon, K., & Seifert, J. P. (2011). Security analysis of a femtocell device. In Proceedings of the 4th international conference on security of information and networks (pp. 95–102). New York: ACM.
29.
Zurück zum Zitat Zhang, Y., Zheng, J., & Hu, H. (Eds.) (2008). Security in wireless mesh networks. Boca Raton: Auerbach. Zhang, Y., Zheng, J., & Hu, H. (Eds.) (2008). Security in wireless mesh networks. Boca Raton: Auerbach.
30.
Zurück zum Zitat Eian, M., & Mjølsnes, S. F. (2011). The modeling and comparison of wireless network denial of service attacks. In Proceedings of the 3rd ACM SOSP workshop on networking, systems, and applications on mobile handhelds (p. 7). New York: ACM. Eian, M., & Mjølsnes, S. F. (2011). The modeling and comparison of wireless network denial of service attacks. In Proceedings of the 3rd ACM SOSP workshop on networking, systems, and applications on mobile handhelds (p. 7). New York: ACM.
31.
Zurück zum Zitat Gollakota, S., Ahmed, N., Zeldovich, N., & Katabi, D. (2011). Secure in-band wireless pairing. In USENIX security symposium. Gollakota, S., Ahmed, N., Zeldovich, N., & Katabi, D. (2011). Secure in-band wireless pairing. In USENIX security symposium.
32.
Zurück zum Zitat Bocan, V., & Cretu, B. (2006). Threats and countermeasures in GSM networks. Journal of Networks, 1(6), 18–27. CrossRef Bocan, V., & Cretu, B. (2006). Threats and countermeasures in GSM networks. Journal of Networks, 1(6), 18–27. CrossRef
33.
Zurück zum Zitat Forsberg, D., Horn, G., Moeller, W., & Niemi, V. (2010). LTE security. New York: Wiley. CrossRef Forsberg, D., Horn, G., Moeller, W., & Niemi, V. (2010). LTE security. New York: Wiley. CrossRef
34.
Zurück zum Zitat Shearer, J., & Gutmann, P. (1996). Government, cryptography, and the right to privacy. Journal of Universal Computer Science, 2(3), 113–146. Shearer, J., & Gutmann, P. (1996). Government, cryptography, and the right to privacy. Journal of Universal Computer Science, 2(3), 113–146.
36.
Zurück zum Zitat Steiniger, S., Neun, M., & Edwardes, A. (2006). Foundations of location based services. Lecture Notes on LBS, v. 1.0. Steiniger, S., Neun, M., & Edwardes, A. (2006). Foundations of location based services. Lecture Notes on LBS, v. 1.0.
37.
Zurück zum Zitat Quercia, D., Lathia, N., Calabrese, F., Di Lorenzo, G., & Crowcroft, J. (2010). Recommending social events from mobile phone location data. In IEEE 10th international conference on data mining (ICDM) (pp. 971–976). New York: IEEE Press. Quercia, D., Lathia, N., Calabrese, F., Di Lorenzo, G., & Crowcroft, J. (2010). Recommending social events from mobile phone location data. In IEEE 10th international conference on data mining (ICDM) (pp. 971–976). New York: IEEE Press.
38.
Zurück zum Zitat Northstream White Paper, 2012, LTE and the 1800 MHz opportunity. Northstream White Paper, 2012, LTE and the 1800 MHz opportunity.
Metadaten
Titel
Security in Emerging 4G Networks
verfasst von
Jacques Bou Abdo
Hakima Chaouchi
Jacques Demerjian
Copyright-Jahr
2013
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-4471-5164-7_12

Premium Partner