英文文獻(xiàn) 科技類 原文及翻譯 (電子 電氣 自動化 通信…)45
《英文文獻(xiàn) 科技類 原文及翻譯 (電子 電氣 自動化 通信…)45》由會員分享,可在線閱讀,更多相關(guān)《英文文獻(xiàn) 科技類 原文及翻譯 (電子 電氣 自動化 通信…)45(19頁珍藏版)》請?jiān)谘b配圖網(wǎng)上搜索。
1、目 錄 外文參考文獻(xiàn)譯文……………………………………………………………………1 1 安防移動通信網(wǎng)絡(luò)的開展史............................................................................1 2 移動通信網(wǎng)絡(luò)的不平安因素…………………………………………………3 無線接口的不平安因素.............................................................................3 2.2 網(wǎng)絡(luò)的不平安因素.................
2、...................................................................4 2.3 移動端的不平安因素……………………………………………………5 2.4 攻擊風(fēng)險(xiǎn)…………………………………………………………………5 3 移動 保護(hù)………………………………………………………………..7 外文參考文獻(xiàn)原文……………………………………………………………………8 1 The history of building mobile network…………………………………...8 2 Insecure ingred
3、ient of mobile communication network………………...11 insecure factor of wireless interface……………………………………11 2.2 insecure factor of network……………………………………………..12 2.3 insecure factor of miton………………………………………………..14 2.4 insecure factor of miton………………………………………………..14 3 The protect of mobile p
4、hone........................................................................18 外文參考文獻(xiàn)譯文 樓宇對講通信網(wǎng)中的平安技術(shù) 1 安防移動通信網(wǎng)絡(luò)的開展史 樓宇對講通信網(wǎng)絡(luò)是無線通信技術(shù)中的一個(gè)重要應(yīng)用領(lǐng)域和組成局部,這項(xiàng)技術(shù)的開發(fā)和應(yīng)用開始于上個(gè)世紀(jì)的20年代,當(dāng)時(shí)主要使用在警察局總部與巡警車之間的移動通信效勞并迅速在警察部門得到推廣應(yīng)用,在人與人的交往中 仍舊是首要的通信工具。智能化建筑內(nèi)的 網(wǎng)是公用電信網(wǎng)的延伸,公用電信網(wǎng)是全球最大的網(wǎng)絡(luò),在不興旺的地區(qū)可
5、能沒有計(jì)算機(jī)網(wǎng)絡(luò),但是一般會有 網(wǎng),因此通過 網(wǎng)可以與世界各地的人們聯(lián)系。不僅如此,我們通過調(diào)制與解調(diào)技術(shù)可以在 網(wǎng)上進(jìn)行數(shù)據(jù)、圖像的傳輸。 1946年,美國的AT&T公司開發(fā)設(shè)計(jì)出一種可以連接移動用戶和固定 用戶的無線 技術(shù);基于這項(xiàng)技術(shù),AT&T公司進(jìn)一步開發(fā)了稱之為安防移動 效勞〔MTS,Mobile Telephone Service〕安防移動通信系統(tǒng),它的改良型I MTS系統(tǒng)在1969年開展成當(dāng)時(shí)唯一的遍布美國的樓宇對講移動通信網(wǎng)絡(luò)。1968年,AT&T公司的貝爾實(shí)驗(yàn)室創(chuàng)造了蜂窩技術(shù),它能將樓宇對講移動通信網(wǎng)絡(luò)的覆蓋區(qū)域劃分成很多類似蜂窩的小區(qū),相隔較遠(yuǎn)的小
6、區(qū)可以使用相同的無線電頻率。蜂窩技術(shù)的應(yīng)用極大地增加了移動通信網(wǎng)絡(luò)容量,并使小區(qū)的基站能采用低功率發(fā)射,防止高發(fā)射功率帶來的干擾問題。蜂窩技術(shù)的創(chuàng)造是移動通信史上的一個(gè)光芒里程碑,它的廣泛應(yīng)用標(biāo)志著樓宇對講移動通信進(jìn)入了蜂窩移動通信時(shí)代。 20世紀(jì)70年代末80年代初,第一代蜂窩樓宇對講移動通信網(wǎng)絡(luò)在日本、瑞典、英國、美國、德國和法國等那么多國家廣泛投入運(yùn)行。第一代蜂窩移動通信網(wǎng)絡(luò)基于模擬通信技術(shù),采用的是頻分復(fù)用〔FDMA,Frequency Division Multiple Access〕模式,網(wǎng)絡(luò)的容量根本可以滿足移動通信用戶的需要。到了20世紀(jì)80年代末,由于模擬技術(shù)的第一代蜂窩移
7、動通信網(wǎng)絡(luò)已經(jīng)顯得過時(shí),集成電路技術(shù)的進(jìn)步推動了數(shù)字通信技術(shù)在第二代安防蜂窩移動通信網(wǎng)絡(luò)中的應(yīng)用。如先進(jìn)的數(shù)字語音編碼技術(shù)在保證話音質(zhì)量的前提下可大大減少通信帶寬的需要提高了網(wǎng)絡(luò)頻段資源的利用率;過失控制技術(shù)增強(qiáng)了網(wǎng)絡(luò)的抗干擾能力―基站可以以低功率發(fā)射;數(shù)字加密技術(shù)可以保護(hù)數(shù)字化了的用戶語音、數(shù)據(jù)和網(wǎng)絡(luò)指令;身份證技術(shù)可以鑒別移動用戶的身份,有效防止身份假冒。所以第二代蜂窩移動通信網(wǎng)絡(luò)相比不僅性能優(yōu)良,而且平安。1990個(gè),泛歐數(shù)字安防蜂窩移動通信網(wǎng)〔GSM,Global System for Mobile Communication〕率先在西歐各國開始運(yùn)行,讓歐洲擺脫了第一代蜂窩移動通信網(wǎng)絡(luò)
8、體制眾多互不相通的困境。GSM網(wǎng)絡(luò)在頻分復(fù)用〔FDMA〕的根底上又采用了時(shí)分多址〔FDMA〕,Time Division Multiple Access〕來增加網(wǎng)絡(luò)容量。其后,澳大利亞、中國和一些中東國家也陸續(xù)采用GSM網(wǎng)絡(luò),使得GSM網(wǎng)絡(luò)成為世界上覆蓋范圍最大的移動通信網(wǎng)絡(luò)。 20世紀(jì)90個(gè)代末期隨著因特網(wǎng)與樓宇移動通信網(wǎng)的融合,低速率數(shù)據(jù)傳輸業(yè)務(wù)已經(jīng)無法滿足移動用戶的需求,對高速率數(shù)據(jù)傳輸業(yè)務(wù)的需求推動著移動通信網(wǎng)絡(luò)走向第三代。為此,國際電信聯(lián)盟ITU就倡導(dǎo)制定一個(gè)全球統(tǒng)一的第三代蜂窩樓宇移動通信網(wǎng)絡(luò)標(biāo)準(zhǔn)――未來公共陸地移動電信網(wǎng)絡(luò)。1998年10月由歐洲、中國、日本、韓國和美國的電信標(biāo)
9、準(zhǔn)組織聯(lián)合成立了第三代伙伴記方案〔3GPP 、the 3rd Generation Partnership Project〕組織,旨在制定一種以IS-95核心網(wǎng)絡(luò)為根底的第三代移動通信網(wǎng)絡(luò)標(biāo)準(zhǔn)CDMA2000。 第三代樓對講移動通信網(wǎng)絡(luò)在本世紀(jì)初開始投入使用,日本的DoCoMo公司于2001年10月1日率先運(yùn)營第三代移動通信網(wǎng)絡(luò)。以上我們簡單地回憶了樓宇對講移動通信的過去和開展現(xiàn)狀,在科學(xué)技術(shù)的進(jìn)步和人們對移動通信效勞需求的雙重推動下,樓宇對講移動通信網(wǎng)絡(luò)仍將繼續(xù)不斷地向前開展,更完美地實(shí)現(xiàn)廣闊樓宇對講移動通信用戶的通信效勞需求。 2 移動通信網(wǎng)絡(luò)的
10、不平安因素 無線電通信網(wǎng)絡(luò)中存在著各種不平安因素―如無線竊聽、身份假冒、篡改數(shù)據(jù)等等。樓宇對講移動通信網(wǎng)絡(luò)作為無線電通信網(wǎng)絡(luò)的一種類型同樣存在著這些不平安因素,由于樓宇對講移動通信網(wǎng)絡(luò)的特殊性,它還存在著其他類型的不平安因素。下面將從移動通信網(wǎng)絡(luò)的接口、網(wǎng)絡(luò)端和移動端三個(gè)局部分別分析其中的不平安因素,以及在安防移動通信網(wǎng)絡(luò)中的具體表現(xiàn)形成及其危害: 2.1 無線接口的不平安因素 在樓宇對講移動通信網(wǎng)絡(luò)中,移動站與固定網(wǎng)絡(luò)端之間的所有通信都是通過無線接口來傳輸?shù)?,但無線接口是開放的,作案者可通過無線接口竊聽信道而取得其中的傳輸信息,甚至可以修改、插入、刪除或重傳無線接口中的消息,到達(dá)假冒移
11、動用戶身份以欺騙網(wǎng)絡(luò)終端的目的。根據(jù)攻擊類型的不同,又可分為非授權(quán)訪部數(shù)據(jù)、非授權(quán)訪問網(wǎng)絡(luò)效勞、威脅數(shù)據(jù)完整性三種。 1.非授權(quán)訪問數(shù)據(jù)攻擊,非授權(quán)訪問數(shù)據(jù)類攻擊的主要目的在于獲取無線接口中傳輸?shù)挠脩魯?shù)據(jù)/或信令數(shù)據(jù)。其方法有如下幾種: 竊聽用戶數(shù)據(jù),獲取用戶信息內(nèi)容。 竊聽信令數(shù)據(jù),獲取網(wǎng)絡(luò)管理信息和其他有利于主動攻擊的信息。 無線跟蹤,獲取移動用戶的身份和位置信息,實(shí)現(xiàn)無線跟蹤。 被動傳輸分析,猜想用戶通信內(nèi)容和目的。 主動傳輸分析,獲取訪問信息。 2.非授權(quán)訪問網(wǎng)絡(luò)效勞攻擊 在非授權(quán)訪問網(wǎng)絡(luò)效勞類攻擊中,攻擊者通過假冒一個(gè)合法移動用戶身份來欺
12、騙網(wǎng)絡(luò)端,獲得授權(quán)訪問網(wǎng)絡(luò)效勞,并逃避付費(fèi),而且由被假冒的移動用戶替攻擊者付費(fèi)。 3.威脅數(shù)據(jù)完整性攻擊 威脅數(shù)據(jù)完整性類攻擊的目標(biāo)是無線接口中的用戶數(shù)據(jù)流和信令數(shù)據(jù)流,攻擊者通過修改、插入、刪除或重傳這些數(shù)據(jù)流來實(shí)現(xiàn)欺騙數(shù)據(jù)接收方的目的,到達(dá)某種攻擊意圖。 2.2 網(wǎng)絡(luò)的不平安因素 在樓宇對講移動通信網(wǎng)絡(luò)中,網(wǎng)絡(luò)端的組成比擬復(fù)雜,它不僅包含許多功能單元,而且不同單元之間的通信媒體也不盡相同。所以安防移動通信網(wǎng)絡(luò)端同樣存在著一些不可無視的不平安因素――如無線竊聽、身份假冒、篡改數(shù)據(jù)和效勞后抵賴等等。按攻擊類型的不同,有如下四類: 1.非授權(quán)訪問數(shù)據(jù)攻擊 非授權(quán)訪問數(shù)據(jù)攻擊的主要
13、目的在于獲取網(wǎng)絡(luò)端單元之間傳輸?shù)挠脩魯?shù)據(jù)和/信令數(shù)據(jù),具體方法有如下幾種: 竊聽用戶數(shù)據(jù),獲取用戶通信內(nèi)容。 竊聽信令數(shù)據(jù),獲取平安管理數(shù)據(jù)和其他有利于主動攻擊的信息。 假冒通信接收,獲取用戶數(shù)據(jù)、信令數(shù)據(jù)和其他有利于主動攻擊的信息。 被動傳輸分析,獲取訪問信息。 非法訪問系統(tǒng)存儲的數(shù)據(jù)――獲取系統(tǒng)中存儲的數(shù)據(jù)如合法用戶的認(rèn)證參數(shù)等。 2.非授權(quán)訪問網(wǎng)絡(luò)效勞攻擊 非授權(quán)訪問網(wǎng)絡(luò)效勞類攻擊的主要目的是訪問網(wǎng)絡(luò)而逃避付款,具體的表現(xiàn)形式有如下幾種: 假冒合法,獲取訪問網(wǎng)絡(luò)效勞的授權(quán)。 假冒效勞網(wǎng)絡(luò),訪問網(wǎng)絡(luò)效勞。 假冒歸屬網(wǎng)絡(luò),獲取可以假冒合法用
14、戶身份的認(rèn)證參數(shù)。 濫用用戶職權(quán),不付費(fèi)而享受網(wǎng)絡(luò)效勞。 濫用網(wǎng)絡(luò)效勞職權(quán),獲取非法盈利。 3.威脅數(shù)據(jù)完整的攻擊 樓宇對講移動通信網(wǎng)絡(luò)端的威脅數(shù)據(jù)完整性類攻擊不僅包括無線接口中的那些威脅數(shù)據(jù)完整性類攻擊,因?yàn)锽SS與MSC之間的通信接口也可能是無線接口。而且,還包括有線通信網(wǎng)絡(luò),具體的表現(xiàn)如下: 操縱用戶數(shù)據(jù),獲取網(wǎng)絡(luò)效勞訪問權(quán)或有意干擾通信。 操縱信令數(shù)據(jù),獲取網(wǎng)絡(luò)效勞訪問權(quán)或有意干擾通信。 假冒通信訪問者,獲取網(wǎng)絡(luò)效勞訪問權(quán)或有意干擾通信。 操縱下載應(yīng)用,干擾移動終端的正常工作。 操縱移動終端,干擾移動終端的正常工作。 操縱網(wǎng)絡(luò)單元中存
15、儲的數(shù)據(jù),獲取網(wǎng)絡(luò)效勞訪問權(quán)有意干擾通信。 2.3 移動端的不平安因素 樓宇對講移動通信網(wǎng)絡(luò)通信網(wǎng)絡(luò)的移動端是由站組成的,移動站不僅是移動用戶訪問移動通信網(wǎng)的通信工具它還保存著移動用戶的個(gè)人信息――如移動設(shè)備國際身份號、移動用戶國際身份號、移動用戶身份認(rèn)證密碼等。移動設(shè)備國際身份號IMEI是唯一地代表一個(gè)移動 ,而移動用戶國際身份號和移動用戶身份認(rèn)證密碼也唯一地對應(yīng)著一個(gè)合法用戶。 由于移動 在日常生活中容易喪失或被盜竊,由此給移動 帶來了如下一些不平安因素: 使用盜竊或撿來的移動 訪問網(wǎng)絡(luò)效勞,不用付費(fèi),給喪失移動 的用戶帶來了經(jīng)濟(jì)上的損失; 不法分
16、子如假設(shè)讀出移動用戶的國際身份號和移動用戶身份認(rèn)證密碼,那么不法分子可以復(fù)制許多移動 ――從事移動 的非法買賣,給移動 用戶和網(wǎng)絡(luò)效勞商帶來了經(jīng)濟(jì)上的損失; 不法分子還會更改盜竊或撿來的移動 的身份號,以此防止被登記在喪失移動 的黑名單上等等。 2.4 攻擊風(fēng)險(xiǎn) 樓宇對講移動通信網(wǎng)絡(luò)中的威脅還有如:無線竊聽、假冒攻擊、完整性侵犯、業(yè)務(wù)否認(rèn)和移動 攻擊等等,具體的描述如下: 無線竊聽,竊聽無線信道中傳送的用戶身份號,用戶數(shù)據(jù)和信令信息; 假冒攻擊,假冒移動用戶欺騙網(wǎng)絡(luò)端和假冒網(wǎng)絡(luò)端欺騙移動用戶; 完整性侵犯,更改無線通信控制信道中傳送的信令信息
17、; 業(yè)務(wù)否認(rèn),移動用戶濫用授權(quán)、網(wǎng)絡(luò)端效勞提供商偽造帳單; 移動 攻擊,偷竊移動 、更改移動 身份號和克隆移動 。 樓宇對講移動通信網(wǎng)絡(luò)中的平安技術(shù)從第一代模似樓宇對講移動通信網(wǎng)到第二代數(shù)字樓對講移動通信網(wǎng)的運(yùn)行經(jīng)驗(yàn)證明:樓宇對講移動通信網(wǎng)絡(luò)中存在的各種不平安因素不僅威脅到移動用戶的隱私和經(jīng)濟(jì)利益,而且嚴(yán)重影響安防移動通信網(wǎng)絡(luò)的正常運(yùn)行,并損害到效勞商和網(wǎng)絡(luò)運(yùn)行商的經(jīng)濟(jì)利益,為了保護(hù)各個(gè)層次的利益,移動通信網(wǎng)絡(luò)必須采用相應(yīng)的平安措施,提供足夠的平安技術(shù)級別效勞; 1.保密性平安技術(shù)效勞可分為五類,其保密目的如下: 用戶語音保密性目的是保護(hù)無線信道中傳送的用戶
18、語音,防止被他人竊聽。 用戶身份保密性目的是用戶的真實(shí)身份,防止被無線跟蹤。 信令數(shù)據(jù)性目的是保護(hù)無線信道中傳送的信令數(shù)據(jù),防止被他人竊聽。 用戶數(shù)據(jù)保密性目的是保護(hù)無線信道中傳羝的用戶數(shù)據(jù),防止被他人竊聽。 認(rèn)證密碼保密性目的是保護(hù)SIM和AC只存儲的認(rèn)證密碼,防止被他人竊取或復(fù)制SIM。 2.認(rèn)證性平安技術(shù)業(yè)務(wù)可分為三類,它們的具體描述如下: 用戶身份認(rèn)證性目的是鑒別移動用戶身份。防止假冒用戶。 網(wǎng)絡(luò)身份認(rèn)證性目的是鑒別網(wǎng)絡(luò)身份,防止主動攻擊者假冒網(wǎng)絡(luò)進(jìn)行欺騙。 信令數(shù)據(jù)的完整性檢測目的是保護(hù)無線信道中傳送的信令信息完整性,防止被他人篡改。 3.應(yīng)用層平安技術(shù)業(yè)務(wù) 上述
19、兩類平安業(yè)務(wù)是在移動通信網(wǎng)絡(luò)的訪問層提供。隨著安防移動通信網(wǎng)絡(luò)類別培多和電子商貿(mào)開展,在應(yīng)用層增設(shè)了平安技術(shù)業(yè)務(wù),它們的具體描述如下: 實(shí)體身份認(rèn)證,兩個(gè)應(yīng)用實(shí)體互相認(rèn)證對方的身份; 數(shù)據(jù)源認(rèn)證,接收方應(yīng)用實(shí)體認(rèn)證數(shù)據(jù)確實(shí)來自于發(fā)送方; 數(shù)據(jù)完整性認(rèn)證,接收方應(yīng)用實(shí)體確認(rèn)接收到的數(shù)據(jù)沒有被篡改; 數(shù)據(jù)保密性,保護(hù)兩應(yīng)用實(shí)體之間的數(shù)據(jù)通信,實(shí)現(xiàn)端到端保密性,防止流分析; 數(shù)據(jù)接收證明,送方應(yīng)用實(shí)體認(rèn)證可證明接收方確實(shí)收到了應(yīng)用數(shù)據(jù)。 3 移動 保護(hù) 移動 商為每部移動 分配一個(gè)全球唯一的國際移動設(shè)備號IMEI,每當(dāng)移動 訪問移動通信網(wǎng)
20、絡(luò),它必須傳其IMEI給網(wǎng)絡(luò)端設(shè)備號登記處EIR;EIR檢查廬IMEI是否在喪失和失竊移動 的名單上,假設(shè)在那么EIR就傳一個(gè)信令將該移動 鎖起來,此時(shí)使用者自己不能開鎖,就不能繼續(xù)使用這個(gè)移動 ,這個(gè)方法在很大程度上防止了非法用戶撿來或偷來的移動 濫用網(wǎng)絡(luò)效勞,而由喪失移動 的合法用戶付費(fèi),但是也有一些不法分子應(yīng)用高科技工具改變偷來的 的IMEI,從而通過名單檢查。為防止修改移動 的IMEI,移動 生產(chǎn)商通常將IMEI設(shè)置在一個(gè)保護(hù)的單元――具有物理防撬功能的只讀存儲器。 無線通信網(wǎng)絡(luò)中存在的不平安因素對網(wǎng)絡(luò)用戶和網(wǎng)絡(luò)經(jīng)營者經(jīng)濟(jì)利益構(gòu)成威脅,為保護(hù)他們的利益
21、,無線電通信網(wǎng)絡(luò)必須應(yīng)用上述相關(guān)技術(shù)的平安業(yè)務(wù)來消除不平安因素給網(wǎng)絡(luò)用戶帶來的威脅。隨著無線通信技術(shù)不斷開展,無線通信網(wǎng)絡(luò)的應(yīng)用不僅深入到國防軍事、科研教育、醫(yī)療衛(wèi)生等國民經(jīng)濟(jì)諸多領(lǐng)域,并已深入到千家萬戶的日常生活。無線通信網(wǎng)絡(luò)應(yīng)用越廣泛,它的平安性就越加重要。 外文參考文獻(xiàn)原文 THE SECURITY OF BULDING MOBILE COMMUNICATION TECHNOLOGY 1 The history of building mobile network Building communications network is a
22、n important application field and ingredient in radio communication technology, which exploited and applicated from the twenties last century, then the mobile communication service used between general headquarter of police office and constable vehicle mainly―And it get application and dissemination
23、 in the branch of police promptly, telephone still is the chief communicate implement in the nowadays, the communication net of intellectualized building is the stretch of public telecommunication net,it is the largest network of the whole world.it may lack of computer network in underdeveloped area
24、, but able to have telephone network, therefore it can contact with people by the telephone network in the world. Transmiting the data and image on the telephone network,which we can use modulation and demodulation techniques. In 1946, the American AT & T company developed the radiotelephone techno
25、logy which can cannect between mobile users and immobility users. Be based upon this technology , AT & T company go a step further developed being called security mobilephone service, security mobile communicate system., I MTS system moves communications network in developing able that time unique b
26、uilding all over USA world correct talk in 1969. Bell laboratory of AT & T company had invented the cellular technology in 1968, the coverage area that it can with building world correct talk displacement communications network partition the housing estate becoming many similar beehives , has been s
27、eparated by more distant small area being able to use identical radio frequency, avoided launching the disturbance problem that power brings about highly, make housing estate base standed can adopt the low frequency launch the invention of cellular technology is a sheen landmark in the mobile commun
28、ication history,it's a times of cellular mobile communication which with it's abroaded application in building communication mobile system. The beginning of 1970's , first generation cellular building communication mobile network throwed into operation broadly in so many countries such as Japan , S
29、weden , United Kingdom , USA , Germany and France,and so on. The first generation cellular mobile communications network based on the analog communication technology,with the mode of frequency division multiple access, the capacitie of network can satisfy the need which use mobilephone. Have arrive
30、d at 1980's powder , have already have appeared obsolete since the beehive simulating first generation generation of technology moves communications network, the progress of integrated circuit technology had driven the digital communication technology which in the security cellular mobile communicat
31、ion network, Bandwidth need communicating by letter if the advanced figure pronunciation code technology may deplete on the premise of mass in guarantee implication have improved network frequency channel resource utilization ratio.The error control technology has strengthened the network anti-inter
32、ference ability--- base-station can launched with low frequency, digital encryption technology being able to protect consumer pronunciation , data and network instruction having digitize, The ID card technology can distinguish the dignity moving a consumer , have an effect to guard against dignity c
33、ounterfeit. Therefore compared with the first,the second generation cellular mobile communication network was high performance, but not better and safer.In the 1990, Global System for Mobile Communication(GSM) take the lead in beginning to work in Europe every country. Europe avoided the first gener
34、ation Cellular mobile communication network system a lot of difficult position not communicating with each other. Based on the Frequency Division Multiple Access (FDMA),the GSM expanded its capability with Time Division Multiple Access. Thereafter,Aussie , China and a few Middle East countries adopt
35、 the GSM network also in succession afterwards, the feasible GSM network becomes largest displacement of in the world coveraged range mobile communications network. Along with the inosculated of Internet and the building mobile telecomunication in the 20 centuries 90 fuse. Low-rated data transmissi
36、on business is already having no way to satisfy the need moving consumer , the need leading data transmission business to high speed is driving moving communications network trend third generation. Therefor, International Telecommunication Union (ITU) proposes that right away working out a unified t
37、hird generation of the whole world Cellular building mobile communications network standard―future common dry land moves the telecommunication network. In October , 1998 the telecommunication standard organization in October , Europe , China , Japan , Korea Republic and American is allied self with
38、 having set up the 3rd Generation Partnership Project. Tin the beginning of this century,hird generation building mobile comunications network begined to be put in used, In taked the leaded in being in motion and doing business on October 1 , 2001, third mobile communications network on behalf of t
39、he Japanese DoCoMo company. All above our have recollected building world correct talk displacement simplely communicating by letter over and present situation progress and people in science and technology drive down to doubleness moving communication service need, the field develops the building wo
40、rld forward to talking to move communications network will still going on without a break , the communication service realizing extensive building mobile communication consummate moving the consumer who communicates by letter needs. 2 Insecure ingredient of mobile communicat
41、ion network A lot of insecure factor inthe radio communication network,such as wireless wire tapping, figure personate, juggle data and so on.Building world these are insecure to being talking as same existence of network one kind of type of radio communication to move communications network factor
42、, since building world correct talk moves the communications network particularity, it is returning existence back other insecure type factor. Following will hold and move concrete behaviour in holding respectively analytical insecure three headquarters factors among them , moving communications net
43、work as well as defending against in safety from the interface , network mobilecommunications network take form and their damage. 2.1 insecure factor of wireless interface In building mobile communication network k, mobile station communicating by letter with the fixation network possessions betwe
44、en end all is by the fact that the wireless interface comes to transfer ,but the wireless interface is open, the malefactor may eavesdrop a route by wireless interface but get transmission information among them, information in even, being able to revise , intervening in , deleting or revaluing the
45、wireless interface of biography, reaches the purpose palming off displacement consumer dignity to cheat the network terminal. According to the diversity attacking a type's, must authorize to visit a headquarter data , must authorize to visit the network service , threaten three kinds data completene
46、ss detachable detachable. (1) disaccredit accessing data attack The chief intention of disaccredit accessing data attack is to gainning data or message. Whose method has as follows several kinds. Eavesdrop consumer data -gaining consumer information content. wiretapping believe data,Gain networ
47、k administration information and information other beneficial to attacking on self's own initiative. wireless follow up the scent,Gain dignity and location information moving a consumer , realize wireless tracking. passiveness transmit analyzing,ake a guess on consumer communicate by letter conten
48、t and purpose. initiative transmit analyzing- Gain visit information. (2) disaccredit accessing administration of networks attack And in must authorize to visit network service kind attack, the attacker cheats a network of end by palming off a legal displacement consumer coming dignity , acquisit
49、ion authorizes to visit the network service, and escape from paying, the consumer pays from the displacement being palmed off for the attacker. (3) intimidatory data integrated attack Threatening the target that the data completeness kind attacks is consumer data stream in wireless interface and m
50、essage order data stream , the attacker deletes by modification , insertion, or weight biography realizes coming these data stream the purpose cheating a data of a receiving party's, reach some kind of attack intention. 2.2 insecure factor of network In building mobile communications network, the
51、 composition that the network holds is comparatively complicated, not only its contain many function elements , but also communication medium is also be unable completely identical between different element. Move the end communications network therefore defending against ampere same existence a few
52、assignable insecure factors eavesdroping if wireless , denying after dignity is counterfeit , tamper with a data and serve and so on. According to the diversity attacking a type's, have four resemble as follows. (1) disaccredit accessing data attack disaccredit accessing data attack to visit the c
53、onsumer data or message order data that the major objective lie in that the data attacks transfers between gaining a network holding an element, concrete method has as follows several kinds. Wiretapping users data:Gain consumer communicate by letter content. wiretapping believedata:Gain network ad
54、ministration information andinformation other beneficial to attacking on self's own initiative. wireless follow up the scent:Gain dignity and location information moving a consumer , realize wireless tracking. counterfeit communication recieve:Gain the consumer data , message order data and inform
55、ation other beneficial to attacking on self's own initiative. Visit the data that system stores illegally:Gain the data storing in system if the attestation of legal consumer parameter waits. (2) disaccredit accessing network service attack disaccredit accessing network service attack to visit th
56、e major objective that attacks being to visit a network but to evade pay a sum of money of , concrete manifestation having growing as follows almost: counterfeit legitimate,warrant gaining the visit network service. counterfeit service network,visit the network service. counterfeit adscription,ga
57、in the attestation parameter being able to palm off legal consumer dignity. abuse user authority – feast network service without any pay. abuse network service authority-Gain gain a profit of illegally. (3) Threaten entire attack of data building mobile communication the threat data completeness
58、 kind that communications network holds attacks those in including the wireless interface not only threatening data completeness kind attack , is a wireless interface because of the communication interface between BSS and MSC is also possible. And, fairly include wired communications network , concr
59、ete behaviour as follows: control user’s data,Gain the network service visiting right or disturb deliberately to communicate by letter. control persuasion data,Gain the network service visiting right or disturb deliberately to communicate by letter. counterfeit communication visitor, Gain the n
60、etwork service visiting right or disturb deliberately to communicate by letter. control download application,Disturb the regularwork of mobile terminal. control mobile terminal : Disturb the regularwork of mobile terminal. Control the data of the network stores in the element: Gain the network se
61、rvice visiting right disturbing communication deliberately. 2.3 insecure factor of miton the displacement moving communications network communications network holds building world correct talk is to be composed of station , moving a station is that it is preserving the individual information movin
62、g a consumer not only move a consumer visiting the communication implement mobile telecommunication networks,such as moving equipment international dignity number ,mobile consumer international dignity number , mobile consumer dignity attestation password and so on. Moving equipment international di
63、gnity number IMEI is a corresponding a legal consumer representing a cellular phone uniquely, but moving consumer international dignity number and the displacement consumer dignity attestation password also unique. as follows insecure since cellular phone has been brought about by cellular phone ea
64、sy to be lost or be stolen, from this in the daily life factor: Use the loss stealing or collecting the cellular phone coming on visiting the network service , being needless to pay , having been brought about economy by the consumer who loses cellular phone. The lawbreaker moves the consumer's in
65、ternational dignity number and moves the consumer dignity attestation secret key if reading out, the lawbreaker can copy a lot of cellular phone - engaged in illegal cellular phone business , give cellular phone consumer and network service business to have brought about upper loss of economy. The
66、 lawbreaker may change the number stealing or selecting cellular phone dignity coming , prevent from on this account being registered to wait a minute on the blacklist losing cellular phone. 2.4 The risk of attack The menace of the building mobile communication such as: Wireless eavesdrop , counterfeit attack , completeness infringe upon,business denies and moves telephone to attack wait a minute,concrete description as follows: Wireless eavesdrop,eavesdrop the consumer dignity number delive
- 溫馨提示:
1: 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
2: 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
3.本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
5. 裝配圖網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 領(lǐng)導(dǎo)班子2024年度民主生活會對照檢查材料范文(三篇)
- 金融工作主題黨課講稿范文(匯編)
- 鍋爐必備學(xué)習(xí)材料
- 鍋爐設(shè)備的檢修
- 主題黨課講稿:走中國特色金融發(fā)展之路加快建設(shè)金融強(qiáng)國(范文)
- 鍋爐基礎(chǔ)知識:啟爐注意事項(xiàng)技術(shù)問答題
- 領(lǐng)導(dǎo)班子2024年度民主生活會“四個(gè)帶頭”對照檢查材料范文(三篇)
- 正常運(yùn)行時(shí)影響鍋爐汽溫的因素和調(diào)整方法
- 3.鍋爐檢修模擬考試復(fù)習(xí)題含答案
- 司爐作業(yè)人員模擬考試試卷含答案-2
- 3.鍋爐閥門模擬考試復(fù)習(xí)題含答案
- 某公司鍋爐安全檢查表
- 3.工業(yè)鍋爐司爐模擬考試題庫試卷含答案
- 4.司爐工考試題含答案解析
- 發(fā)電廠鍋爐的運(yùn)行監(jiān)視和調(diào)整