Securing reconfigurable terminals - mechanisms and protocols
نویسندگان
چکیده
Software reconfigurability of air interfaces, the actual reconfiguration processes and the procurement of reconfiguration software are posing substantial threats to the system integrity of wireless communication system. These threats are investigated and reported in this paper and mechanisms to ensure secure reconfiguration procedures are described. The security mechanisms documented form part of the MVCE Reconfiguration Management Architecture (RMA).
منابع مشابه
Secure Mobile Delegation for Future Reconfigurable Terminals and Applications
The main goal of this paper is to address applications of secure mobile delegation for future reconfigurable terminals. Additionally, a general overview will be given on past and present distributed reconfigurable mobile terminals in a Personal Area Network (PAN) context. The PAN may include a number of mobile devices which need to exchange information with each other and with their users; tech...
متن کاملSoftware Download Management for Reconfigurable Terminals in UMTS/FDD
This paper introduces a novel approach of software download management for reconfigurable terminals using common channels in WCDMA system. We introduce in this paper protocols, which enhance cellgrouping broadcast approach for software downloads that, are mainly used to reduce interference in interference limited CDMA based system. In addition, it gives the fundamental load based criteria in sy...
متن کاملEfficient Security Mechanisms for Routing Protocols
As our economy and critical infrastructure increasingly rely on the Internet, securing routing protocols becomes of critical importance. In this paper, we present four new mechanisms as tools for securing distance vector and path vector routing protocols. For securing distance vector protocols, our hash tree chain mechanism forces a router to increase the distance (metric) when forwarding a rou...
متن کاملSecuring Distance-vector Routing Protocols Securing Distance-vector Routing Protocols
The security requirements of distance-vector routing protocols are analyzed, their vulnerabilities identi ed, and countermeasures to these vulnerabilities are proposed. The innovation presented involves the use of mechanisms from the pathnding class of distancevector protocols as a solution to the security problems of distance-vector protocols. The result is the rst proposal to e ectively and e...
متن کاملEfficient Security Mechanisms for Routing Protocolsa
As our economy and critical infrastructure increasingly rely on the Internet, securing routing protocols becomes of critical importance. In this paper, we present four new mechanisms as tools for securing distance vector and path vector routing protocols. For securing distance vector protocols, our hash tree chain mechanism forces a router to increase the distance (metric) when forwarding a rou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002