موجز عن البحث:
|
In recent years,
there have been major developments in, and deployment of, diverse mobile
technology. Security issues in mobile computing are now presenting
significant challenges. Heterogeneous networks are the convergence of wired
and wireless networks, other diverse end user devices and other communication
technologies which provide very high speed connections. Major security
challenges in 4G heterogeneous networks are inherent in current internet
security threats and IP security vulnerabilities. In this paper, we propose a
management system which is responsible for enforcing security policies and
ensuring that security policies continued to be followed. The objective of
this security management system is to prevent the mobile equipment from being
abused or used as a malicious attack tool. The proposed security management
system is consistent with the security specifications defined by ITU-T
recommendation M.3400 TMN management functions. Finally, this paper will present a policy-based
architecture for the security management system of 4G heterogeneous networks
focusing on detection and prevention of malicious attacks.
|
ملخص المشاركة:
|
The Development of
mobile networks is significant research topics for research studies. The
demand for this development is due to the service requirements of the users.
The current existing mobile networks are the fourth generation of mobile
networks. The 4G networks are expected to provide high speed connections at
anytime and anywhere. Different architectures for the 4G mobile networks are
presented, such as LTE and WiMax, which only support wireless technologies.
Another architecture, Y-Comm, has been proposed to combine both existing
wired and wireless networks.
One of the major
Y-Comm characteristics is heterogeneity. However, this heterogeneity leads to
technical issues such as the quality of service (QoS), vertical handover and
security. Due to the convergence characteristic of Y-comm security is
considered as high significant issue in Y-Comm than in the previous networks
(LTE and WiMax). These security issues motivate this research study to
propose a novel security management system. This research aims to meet the
security requirements of 4G mobile networks, e.g. preventing end user device
from being used as an attack tool. This requirement has not been met clearly
in previous research studies about Y-Comm. Constructively, this proposed
security management system prevents this end user device from being used as
attack tool in the Y-Comm environment.
This research found
that the security management system can meet the security requirements in
this Y-Comm environment This means that the security management system is
able to prevent the end user device from being used as an attack tool. This
system also can achieve other the security goals of Y-Comm networks.
|
ملخص المشاركة:
|
In recent years, there have been major developments in, and deployment of, diverse mobile technology. Security issues in mobile computing are now
presenting significant challenges. The ability to move from one network to another, and from one provider to another creating thus vertical and horizontal handoffs, has increased the complexity of mobile security. There are many research groups, such as Hokey and Y-Comm, working on
the design of security architectures for 4G networks. Heterogeneous networks are the convergence of wired and
wireless networks, other diverse end user devices and other communication
technologies which provide very high speed
connections. Major security challenges in 4G heterogeneous networks
are inherent in current internet security threats and IP security
vulnerabilities. These new challenges are: IP address spoofing, user ID theft, Theft of Service, Denial of Service, and intrusion
attacks. Therefore, it is necessary to design security solutions which are independent from
the network, provider, and
end user devices. Existing technique in 4G heterogeneous security networks has not achieved major mobile security requirements such as protecting the mobile equipment; integrity of the hardware, and software. They do not
prevent access to the mobile data and the mobile equipment can be used as an
attack tool. In addition, current researches in security 4G heterogeneous network do not consider a security management system based on ITU-T M.3400 TMN
management functions or any other related standards. In this paper, we propose a management system which is responsible for enforcing security policies and ensuring that
security policies continued to be followed. The objective of this security
management system is to prevent the mobile equipment from being abused or used as a malicious attack tool. The proposed security management system is consistent with the security specifications defined by ITU-T recommendation M.3400
TMN management functions. Finally, this paper will present
a policy-based architecture for the
security management system of 4G heterogeneous networks focusing on detection and prevention of malicious attacks. This architecture will consist of intelligent agent, security engine, security policies database, and security administrator.
|