期刊文献+

一种基于GTP协议的“动态隧道”防御方法 被引量:1

A “dynamic tunnel”defense method based on GTP protocol
下载PDF
导出
摘要 针对移动通信网中用户分组数据在x GSN设备中的安全传输和隐私保护问题,提出一种基于GTP协议的"动态隧道"防御方法,构建拟态网关,让SGSN和GGSN之间用于传输用户分组数据的隧道标志(TEID)动态变化,打破TEID与用户身份标志的静态对应关系,从而保护用户分组数据。理论分析和仿真结果表明,"动态隧道"方法能提高系统安全性,有效保护用户隐私信息,而且通信开销和延时较低。 For the user packet data transmission security and privacy issues in xGSN of mobile communication network, this paper proposed a "dynamic tunnel" defense mechanism based on GTP protocol. The method dynamically changes the tunnel endpoint identifier (TEID) used for the transmission of user packets between SGSN and GGSN by building a mimicry gateway, which broke the static correspondence between TEID and user identification, thus achieving the purpose of protecting user packet data. Theoretical analysis and simulation results indicate that the "dynamic tunnel" method can improve system securi- ty and effectively protect user privacy information with low communication overhead and latency.
作者 张青 刘彩霞
出处 《计算机应用研究》 CSCD 北大核心 2016年第11期3442-3445,共4页 Application Research of Computers
基金 国家科技重大专项基金资助项目(2013ZX03006002) 国家自然科学基金资助项目(61521003)
关键词 移动通信网 移动目标防御 拟态安全防御 动态隧道 隧道标志符 mobile communication network moving target defense mimic security defense dynamic tunnel tunnel end- point identifier
  • 相关文献

参考文献9

  • 1http://www, cert. org. en/publish/main/46/2015/20150601155121- 202938498/20150601155121202938498_html [ EB/OL].
  • 2http://www, igrinc, com/htmL/downloads/free_white_papers/3G_ MobileSecurity_Jan07. pdf[ EB/OL ]. 2007.
  • 3Yang H, Ricciato F, Lu S, et al. Securing a wireless world [ J ]. Proceedings of the IEEE, 2006, 94(2) : 442-454.
  • 4GPP TS 29. 060 v8.8.0. GPRS tunnelling protocol(GTP) across the Gn and Gp interface[ EB/OL]. 2009. http://www. 3gpp. org.
  • 5邬江兴.拟态计算与拟态安全防御的原意和愿景[J].电信科学,2014,30(7):1-7. 被引量:100
  • 6Jajodia S, Ghosh A K, Swarup V, et al. Moving target defense: crea- ting asymmetric uncertainty for cyber threats [ M ]. [ S. 1. ] : Springer Science & Business Media, 2011.
  • 7Groat S, Moore R, Marchany R, et al. Securing static nodes in mo- bile-enabled systems using a network-layer moving target defense [ C ]//Proc of the 1 st International Workshop on Engineering of Mo- bile-Enabled Systems. [S. 1. ] :IEEE Press, 2013: 42-47.
  • 8Dunlop M, Groat S, Urbanski W, et al. Mt6d: a moving target IPv6 defense[ C]//Proc of Military Communications Conference. [ S. 1. ] : IEEE Press, 2011 : 1321-1326.
  • 9Carroll T E, Crouse M, Fulp E W, et al. Analysis of network address shuffling as a moving target defense[ C ]//Proc of IEEE International Conference on Communications. [ S. 1. ] :IEEE Press, 2014: 701- 706.

共引文献99

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部