Securing reconfigurable terminals - mechanisms and protocols

نویسندگان

  • Stoytcho Gultchev
  • Christopher Mitchell
  • Klaus Moessner
  • Rahim Tafazolli
چکیده

Software reconfigurability of air interfaces, the actual reconfiguration processes and the procurement of reconfiguration software are posing substantial threats to the system integrity of wireless communication system. These threats are investigated and reported in this paper and mechanisms to ensure secure reconfiguration procedures are described. The security mechanisms documented form part of the MVCE Reconfiguration Management Architecture (RMA).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Mobile Delegation for Future Reconfigurable Terminals and Applications

The main goal of this paper is to address applications of secure mobile delegation for future reconfigurable terminals. Additionally, a general overview will be given on past and present distributed reconfigurable mobile terminals in a Personal Area Network (PAN) context. The PAN may include a number of mobile devices which need to exchange information with each other and with their users; tech...

متن کامل

Software Download Management for Reconfigurable Terminals in UMTS/FDD

This paper introduces a novel approach of software download management for reconfigurable terminals using common channels in WCDMA system. We introduce in this paper protocols, which enhance cellgrouping broadcast approach for software downloads that, are mainly used to reduce interference in interference limited CDMA based system. In addition, it gives the fundamental load based criteria in sy...

متن کامل

Efficient Security Mechanisms for Routing Protocols

As our economy and critical infrastructure increasingly rely on the Internet, securing routing protocols becomes of critical importance. In this paper, we present four new mechanisms as tools for securing distance vector and path vector routing protocols. For securing distance vector protocols, our hash tree chain mechanism forces a router to increase the distance (metric) when forwarding a rou...

متن کامل

Securing Distance-vector Routing Protocols Securing Distance-vector Routing Protocols

The security requirements of distance-vector routing protocols are analyzed, their vulnerabilities identi ed, and countermeasures to these vulnerabilities are proposed. The innovation presented involves the use of mechanisms from the pathnding class of distancevector protocols as a solution to the security problems of distance-vector protocols. The result is the rst proposal to e ectively and e...

متن کامل

Efficient Security Mechanisms for Routing Protocolsa

As our economy and critical infrastructure increasingly rely on the Internet, securing routing protocols becomes of critical importance. In this paper, we present four new mechanisms as tools for securing distance vector and path vector routing protocols. For securing distance vector protocols, our hash tree chain mechanism forces a router to increase the distance (metric) when forwarding a rou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002