Skip to main content

2018 | OriginalPaper | Buchkapitel

7. Security of Dedicated Mobile Communications for Railway

verfasst von : Zhang-Dui Zhong, Bo Ai, Gang Zhu, Hao Wu, Lei Xiong, Fang-Gang Wang, Lei Lei, Jian-Wen Ding, Ke Guan, Rui-Si He

Erschienen in: Dedicated Mobile Communications for High-speed Railway

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter covers security schemes of dedicated mobile communications for railway. Due to the control signal is transmitted via wireless channel, communication security is crucial to the whole rail transit system. Although currently the mobile communication infrastructure in railway is based on public cellular mobile communications, considering the rail transit has characteristics of ultra-high moving velocity and high reliability and safety demand, traditional security mechanism is unable to satisfy the basic requirements of the rail transit scenario. On the one hand, there are still some threats remained in GSM-R. On the other hand, the future dedicated mobile network for railway is heterogeneous and complicated, including 2G, 3G, 4G, WLAN networks, and mobile relays. How to achieve fast authentic handover scheme across domains is a problem that must be solved. In this chapter, we first introduce the security problems in mobile communications. Next, we describe in detail the key improvements of railway communication technology. Finally, we introduce some key technologies in heterogeneous network environment and give a brief prospect of the future research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Xu S, Ma W, Wang X (2003) Security technology in wireless communication network. Posts and Telecom Press, Beijing, pp. 36–41 Xu S, Ma W, Wang X (2003) Security technology in wireless communication network. Posts and Telecom Press, Beijing, pp. 36–41
2.
Zurück zum Zitat Vines RD (2002) Wireless security essentials: defending mobile systems from data piracy. Wiley Publishing, New York Vines RD (2002) Wireless security essentials: defending mobile systems from data piracy. Wiley Publishing, New York
3.
Zurück zum Zitat Maxim M, Pollino D (2002) Wireless security. McGraw-Hill, Maidenhead Maxim M, Pollino D (2002) Wireless security. McGraw-Hill, Maidenhead
4.
Zurück zum Zitat Liu Y, Fan Z (2004) Analyses and countermeasures of GSM—R network security. Railw Signal Commun Eng 6:27–30 Liu Y, Fan Z (2004) Analyses and countermeasures of GSM—R network security. Railw Signal Commun Eng 6:27–30
5.
Zurück zum Zitat Song Y, Zhou K, Yao B, Chen X (2010) A GSM/UMTS Selective Jamming System. International Conference on Multimedia Information Networking and Security Song Y, Zhou K, Yao B, Chen X (2010) A GSM/UMTS Selective Jamming System. International Conference on Multimedia Information Networking and Security
6.
Zurück zum Zitat Zhang M, Fang Y (2005) Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Trans Wirel Commun 1(12):734–742CrossRef Zhang M, Fang Y (2005) Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Trans Wirel Commun 1(12):734–742CrossRef
7.
Zurück zum Zitat Wu H, Shi X, Gu Y (2009) Research and improvement on security of GSM-R system. J Beijing Jiaotong Univ 33(2):127–1301 Wu H, Shi X, Gu Y (2009) Research and improvement on security of GSM-R system. J Beijing Jiaotong Univ 33(2):127–1301
8.
Zurück zum Zitat Zeidler HM (1986) End-to-end encryption system and method of operation. US, US 4578530 A Zeidler HM (1986) End-to-end encryption system and method of operation. US, US 4578530 A
9.
Zurück zum Zitat Al-Fayoumi MA, Shilbayeh NF (2014) Cloning sim cards usability reduction in mobile networks. J Network System Management 22(2):259–279 Al-Fayoumi MA, Shilbayeh NF (2014) Cloning sim cards usability reduction in mobile networks. J Network System Management 22(2):259–279
10.
Zurück zum Zitat Wu H, Gu YH, Zhong ZD (2013) One type of GSM-R fast handover algorithm for high-speed railway. In: IET, international conference on wireless, Mobile and Multimedia Networks, IET, pp.175–178 Wu H, Gu YH, Zhong ZD (2013) One type of GSM-R fast handover algorithm for high-speed railway. In: IET, international conference on wireless, Mobile and Multimedia Networks, IET, pp.175–178
11.
Zurück zum Zitat Black J, Halevi S, Krawczyk H, Krovetz T, Rogaway P (1999) UMAC: fast and secure message authentication. In: Advances in cryptology - CRYPTO '99, international cryptology conference, Santa Barbara, California, Usa, August 15–19, 1999, Proceedings (Vol.1666, pp.216–233), DBLP Black J, Halevi S, Krawczyk H, Krovetz T, Rogaway P (1999) UMAC: fast and secure message authentication. In: Advances in cryptology - CRYPTO '99, international cryptology conference, Santa Barbara, California, Usa, August 15–19, 1999, Proceedings (Vol.1666, pp.216–233), DBLP
12.
Zurück zum Zitat Asokan N, Ekberg JE, Kostiainen K, Rajan A, Rozas C, Sadeghi AR et al (2014) Mobile trusted computing. Proceed IEEE 102(8):1189–1206 Asokan N, Ekberg JE, Kostiainen K, Rajan A, Rozas C, Sadeghi AR et al (2014) Mobile trusted computing. Proceed IEEE 102(8):1189–1206
13.
Zurück zum Zitat Madlmayr G (2008) A mobile trusted computing architecture for a near field communication ecosystem. In: iiWAS'2008 - The tenth international conference on information integration and web-based applications services, 24–26 November 2008, Linz, Austria (pp.563–566), DBLP Madlmayr G (2008) A mobile trusted computing architecture for a near field communication ecosystem. In: iiWAS'2008 - The tenth international conference on information integration and web-based applications services, 24–26 November 2008, Linz, Austria (pp.563–566), DBLP
14.
Zurück zum Zitat Chengdu (2006) Trusted computing based user authentication for mobile equipment. Chinese J Comput 29(8):1255–1264 Chengdu (2006) Trusted computing based user authentication for mobile equipment. Chinese J Comput 29(8):1255–1264
Metadaten
Titel
Security of Dedicated Mobile Communications for Railway
verfasst von
Zhang-Dui Zhong
Bo Ai
Gang Zhu
Hao Wu
Lei Xiong
Fang-Gang Wang
Lei Lei
Jian-Wen Ding
Ke Guan
Rui-Si He
Copyright-Jahr
2018
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-54860-8_7