英文文獻 科技類 原文及翻譯 (電子 電氣 自動化 通信…)45

上傳人:r****d 文檔編號:130747831 上傳時間:2022-08-05 格式:DOC 頁數(shù):19 大?。?3.50KB
收藏 版權申訴 舉報 下載
英文文獻 科技類 原文及翻譯 (電子 電氣 自動化 通信…)45_第1頁
第1頁 / 共19頁
英文文獻 科技類 原文及翻譯 (電子 電氣 自動化 通信…)45_第2頁
第2頁 / 共19頁
英文文獻 科技類 原文及翻譯 (電子 電氣 自動化 通信…)45_第3頁
第3頁 / 共19頁

下載文檔到電腦,查找使用更方便

15 積分

下載資源

還剩頁未讀,繼續(xù)閱讀

資源描述:

《英文文獻 科技類 原文及翻譯 (電子 電氣 自動化 通信…)45》由會員分享,可在線閱讀,更多相關《英文文獻 科技類 原文及翻譯 (電子 電氣 自動化 通信…)45(19頁珍藏版)》請在裝配圖網(wǎng)上搜索。

1、目 錄 外文參考文獻譯文……………………………………………………………………1 1 安防移動通信網(wǎng)絡的開展史............................................................................1 2 移動通信網(wǎng)絡的不平安因素…………………………………………………3 無線接口的不平安因素.............................................................................3 2.2 網(wǎng)絡的不平安因素.................

2、...................................................................4 2.3 移動端的不平安因素……………………………………………………5 2.4 攻擊風險…………………………………………………………………5 3 移動 保護………………………………………………………………..7 外文參考文獻原文……………………………………………………………………8 1 The history of building mobile network…………………………………...8 2 Insecure ingred

3、ient of mobile communication network………………...11 insecure factor of wireless interface……………………………………11 2.2 insecure factor of network……………………………………………..12 2.3 insecure factor of miton………………………………………………..14 2.4 insecure factor of miton………………………………………………..14 3 The protect of mobile p

4、hone........................................................................18 外文參考文獻譯文 樓宇對講通信網(wǎng)中的平安技術 1 安防移動通信網(wǎng)絡的開展史   樓宇對講通信網(wǎng)絡是無線通信技術中的一個重要應用領域和組成局部,這項技術的開發(fā)和應用開始于上個世紀的20年代,當時主要使用在警察局總部與巡警車之間的移動通信效勞并迅速在警察部門得到推廣應用,在人與人的交往中 仍舊是首要的通信工具。智能化建筑內(nèi)的 網(wǎng)是公用電信網(wǎng)的延伸,公用電信網(wǎng)是全球最大的網(wǎng)絡,在不興旺的地區(qū)可

5、能沒有計算機網(wǎng)絡,但是一般會有 網(wǎng),因此通過 網(wǎng)可以與世界各地的人們聯(lián)系。不僅如此,我們通過調制與解調技術可以在 網(wǎng)上進行數(shù)據(jù)、圖像的傳輸。 1946年,美國的AT&T公司開發(fā)設計出一種可以連接移動用戶和固定 用戶的無線 技術;基于這項技術,AT&T公司進一步開發(fā)了稱之為安防移動 效勞〔MTS,Mobile Telephone Service〕安防移動通信系統(tǒng),它的改良型I MTS系統(tǒng)在1969年開展成當時唯一的遍布美國的樓宇對講移動通信網(wǎng)絡。1968年,AT&T公司的貝爾實驗室創(chuàng)造了蜂窩技術,它能將樓宇對講移動通信網(wǎng)絡的覆蓋區(qū)域劃分成很多類似蜂窩的小區(qū),相隔較遠的小

6、區(qū)可以使用相同的無線電頻率。蜂窩技術的應用極大地增加了移動通信網(wǎng)絡容量,并使小區(qū)的基站能采用低功率發(fā)射,防止高發(fā)射功率帶來的干擾問題。蜂窩技術的創(chuàng)造是移動通信史上的一個光芒里程碑,它的廣泛應用標志著樓宇對講移動通信進入了蜂窩移動通信時代。 20世紀70年代末80年代初,第一代蜂窩樓宇對講移動通信網(wǎng)絡在日本、瑞典、英國、美國、德國和法國等那么多國家廣泛投入運行。第一代蜂窩移動通信網(wǎng)絡基于模擬通信技術,采用的是頻分復用〔FDMA,Frequency Division Multiple Access〕模式,網(wǎng)絡的容量根本可以滿足移動通信用戶的需要。到了20世紀80年代末,由于模擬技術的第一代蜂窩移

7、動通信網(wǎng)絡已經(jīng)顯得過時,集成電路技術的進步推動了數(shù)字通信技術在第二代安防蜂窩移動通信網(wǎng)絡中的應用。如先進的數(shù)字語音編碼技術在保證話音質量的前提下可大大減少通信帶寬的需要提高了網(wǎng)絡頻段資源的利用率;過失控制技術增強了網(wǎng)絡的抗干擾能力―基站可以以低功率發(fā)射;數(shù)字加密技術可以保護數(shù)字化了的用戶語音、數(shù)據(jù)和網(wǎng)絡指令;身份證技術可以鑒別移動用戶的身份,有效防止身份假冒。所以第二代蜂窩移動通信網(wǎng)絡相比不僅性能優(yōu)良,而且平安。1990個,泛歐數(shù)字安防蜂窩移動通信網(wǎng)〔GSM,Global System for Mobile Communication〕率先在西歐各國開始運行,讓歐洲擺脫了第一代蜂窩移動通信網(wǎng)絡

8、體制眾多互不相通的困境。GSM網(wǎng)絡在頻分復用〔FDMA〕的根底上又采用了時分多址〔FDMA〕,Time Division Multiple Access〕來增加網(wǎng)絡容量。其后,澳大利亞、中國和一些中東國家也陸續(xù)采用GSM網(wǎng)絡,使得GSM網(wǎng)絡成為世界上覆蓋范圍最大的移動通信網(wǎng)絡。 20世紀90個代末期隨著因特網(wǎng)與樓宇移動通信網(wǎng)的融合,低速率數(shù)據(jù)傳輸業(yè)務已經(jīng)無法滿足移動用戶的需求,對高速率數(shù)據(jù)傳輸業(yè)務的需求推動著移動通信網(wǎng)絡走向第三代。為此,國際電信聯(lián)盟ITU就倡導制定一個全球統(tǒng)一的第三代蜂窩樓宇移動通信網(wǎng)絡標準――未來公共陸地移動電信網(wǎng)絡。1998年10月由歐洲、中國、日本、韓國和美國的電信標

9、準組織聯(lián)合成立了第三代伙伴記方案〔3GPP 、the 3rd Generation Partnership Project〕組織,旨在制定一種以IS-95核心網(wǎng)絡為根底的第三代移動通信網(wǎng)絡標準CDMA2000。 第三代樓對講移動通信網(wǎng)絡在本世紀初開始投入使用,日本的DoCoMo公司于2001年10月1日率先運營第三代移動通信網(wǎng)絡。以上我們簡單地回憶了樓宇對講移動通信的過去和開展現(xiàn)狀,在科學技術的進步和人們對移動通信效勞需求的雙重推動下,樓宇對講移動通信網(wǎng)絡仍將繼續(xù)不斷地向前開展,更完美地實現(xiàn)廣闊樓宇對講移動通信用戶的通信效勞需求。 2 移動通信網(wǎng)絡的

10、不平安因素 無線電通信網(wǎng)絡中存在著各種不平安因素―如無線竊聽、身份假冒、篡改數(shù)據(jù)等等。樓宇對講移動通信網(wǎng)絡作為無線電通信網(wǎng)絡的一種類型同樣存在著這些不平安因素,由于樓宇對講移動通信網(wǎng)絡的特殊性,它還存在著其他類型的不平安因素。下面將從移動通信網(wǎng)絡的接口、網(wǎng)絡端和移動端三個局部分別分析其中的不平安因素,以及在安防移動通信網(wǎng)絡中的具體表現(xiàn)形成及其危害: 2.1 無線接口的不平安因素 在樓宇對講移動通信網(wǎng)絡中,移動站與固定網(wǎng)絡端之間的所有通信都是通過無線接口來傳輸?shù)?,但無線接口是開放的,作案者可通過無線接口竊聽信道而取得其中的傳輸信息,甚至可以修改、插入、刪除或重傳無線接口中的消息,到達假冒移

11、動用戶身份以欺騙網(wǎng)絡終端的目的。根據(jù)攻擊類型的不同,又可分為非授權訪部數(shù)據(jù)、非授權訪問網(wǎng)絡效勞、威脅數(shù)據(jù)完整性三種。 1.非授權訪問數(shù)據(jù)攻擊,非授權訪問數(shù)據(jù)類攻擊的主要目的在于獲取無線接口中傳輸?shù)挠脩魯?shù)據(jù)/或信令數(shù)據(jù)。其方法有如下幾種:   竊聽用戶數(shù)據(jù),獲取用戶信息內(nèi)容。   竊聽信令數(shù)據(jù),獲取網(wǎng)絡管理信息和其他有利于主動攻擊的信息。   無線跟蹤,獲取移動用戶的身份和位置信息,實現(xiàn)無線跟蹤。   被動傳輸分析,猜想用戶通信內(nèi)容和目的。   主動傳輸分析,獲取訪問信息。 2.非授權訪問網(wǎng)絡效勞攻擊 在非授權訪問網(wǎng)絡效勞類攻擊中,攻擊者通過假冒一個合法移動用戶身份來欺

12、騙網(wǎng)絡端,獲得授權訪問網(wǎng)絡效勞,并逃避付費,而且由被假冒的移動用戶替攻擊者付費。 3.威脅數(shù)據(jù)完整性攻擊 威脅數(shù)據(jù)完整性類攻擊的目標是無線接口中的用戶數(shù)據(jù)流和信令數(shù)據(jù)流,攻擊者通過修改、插入、刪除或重傳這些數(shù)據(jù)流來實現(xiàn)欺騙數(shù)據(jù)接收方的目的,到達某種攻擊意圖。 2.2 網(wǎng)絡的不平安因素 在樓宇對講移動通信網(wǎng)絡中,網(wǎng)絡端的組成比擬復雜,它不僅包含許多功能單元,而且不同單元之間的通信媒體也不盡相同。所以安防移動通信網(wǎng)絡端同樣存在著一些不可無視的不平安因素――如無線竊聽、身份假冒、篡改數(shù)據(jù)和效勞后抵賴等等。按攻擊類型的不同,有如下四類: 1.非授權訪問數(shù)據(jù)攻擊 非授權訪問數(shù)據(jù)攻擊的主要

13、目的在于獲取網(wǎng)絡端單元之間傳輸?shù)挠脩魯?shù)據(jù)和/信令數(shù)據(jù),具體方法有如下幾種:   竊聽用戶數(shù)據(jù),獲取用戶通信內(nèi)容。   竊聽信令數(shù)據(jù),獲取平安管理數(shù)據(jù)和其他有利于主動攻擊的信息。   假冒通信接收,獲取用戶數(shù)據(jù)、信令數(shù)據(jù)和其他有利于主動攻擊的信息。   被動傳輸分析,獲取訪問信息。   非法訪問系統(tǒng)存儲的數(shù)據(jù)――獲取系統(tǒng)中存儲的數(shù)據(jù)如合法用戶的認證參數(shù)等。 2.非授權訪問網(wǎng)絡效勞攻擊 非授權訪問網(wǎng)絡效勞類攻擊的主要目的是訪問網(wǎng)絡而逃避付款,具體的表現(xiàn)形式有如下幾種:   假冒合法,獲取訪問網(wǎng)絡效勞的授權。   假冒效勞網(wǎng)絡,訪問網(wǎng)絡效勞。   假冒歸屬網(wǎng)絡,獲取可以假冒合法用

14、戶身份的認證參數(shù)。   濫用用戶職權,不付費而享受網(wǎng)絡效勞。   濫用網(wǎng)絡效勞職權,獲取非法盈利。 3.威脅數(shù)據(jù)完整的攻擊 樓宇對講移動通信網(wǎng)絡端的威脅數(shù)據(jù)完整性類攻擊不僅包括無線接口中的那些威脅數(shù)據(jù)完整性類攻擊,因為BSS與MSC之間的通信接口也可能是無線接口。而且,還包括有線通信網(wǎng)絡,具體的表現(xiàn)如下:   操縱用戶數(shù)據(jù),獲取網(wǎng)絡效勞訪問權或有意干擾通信。   操縱信令數(shù)據(jù),獲取網(wǎng)絡效勞訪問權或有意干擾通信。   假冒通信訪問者,獲取網(wǎng)絡效勞訪問權或有意干擾通信。   操縱下載應用,干擾移動終端的正常工作。   操縱移動終端,干擾移動終端的正常工作。   操縱網(wǎng)絡單元中存

15、儲的數(shù)據(jù),獲取網(wǎng)絡效勞訪問權有意干擾通信。 2.3 移動端的不平安因素 樓宇對講移動通信網(wǎng)絡通信網(wǎng)絡的移動端是由站組成的,移動站不僅是移動用戶訪問移動通信網(wǎng)的通信工具它還保存著移動用戶的個人信息――如移動設備國際身份號、移動用戶國際身份號、移動用戶身份認證密碼等。移動設備國際身份號IMEI是唯一地代表一個移動 ,而移動用戶國際身份號和移動用戶身份認證密碼也唯一地對應著一個合法用戶。   由于移動 在日常生活中容易喪失或被盜竊,由此給移動 帶來了如下一些不平安因素:   使用盜竊或撿來的移動 訪問網(wǎng)絡效勞,不用付費,給喪失移動 的用戶帶來了經(jīng)濟上的損失;   不法分

16、子如假設讀出移動用戶的國際身份號和移動用戶身份認證密碼,那么不法分子可以復制許多移動 ――從事移動 的非法買賣,給移動 用戶和網(wǎng)絡效勞商帶來了經(jīng)濟上的損失;   不法分子還會更改盜竊或撿來的移動 的身份號,以此防止被登記在喪失移動 的黑名單上等等。 2.4 攻擊風險 樓宇對講移動通信網(wǎng)絡中的威脅還有如:無線竊聽、假冒攻擊、完整性侵犯、業(yè)務否認和移動 攻擊等等,具體的描述如下:   無線竊聽,竊聽無線信道中傳送的用戶身份號,用戶數(shù)據(jù)和信令信息;   假冒攻擊,假冒移動用戶欺騙網(wǎng)絡端和假冒網(wǎng)絡端欺騙移動用戶;   完整性侵犯,更改無線通信控制信道中傳送的信令信息

17、;   業(yè)務否認,移動用戶濫用授權、網(wǎng)絡端效勞提供商偽造帳單;   移動 攻擊,偷竊移動 、更改移動 身份號和克隆移動 。  樓宇對講移動通信網(wǎng)絡中的平安技術從第一代模似樓宇對講移動通信網(wǎng)到第二代數(shù)字樓對講移動通信網(wǎng)的運行經(jīng)驗證明:樓宇對講移動通信網(wǎng)絡中存在的各種不平安因素不僅威脅到移動用戶的隱私和經(jīng)濟利益,而且嚴重影響安防移動通信網(wǎng)絡的正常運行,并損害到效勞商和網(wǎng)絡運行商的經(jīng)濟利益,為了保護各個層次的利益,移動通信網(wǎng)絡必須采用相應的平安措施,提供足夠的平安技術級別效勞; 1.保密性平安技術效勞可分為五類,其保密目的如下: 用戶語音保密性目的是保護無線信道中傳送的用戶

18、語音,防止被他人竊聽。 用戶身份保密性目的是用戶的真實身份,防止被無線跟蹤。 信令數(shù)據(jù)性目的是保護無線信道中傳送的信令數(shù)據(jù),防止被他人竊聽。 用戶數(shù)據(jù)保密性目的是保護無線信道中傳羝的用戶數(shù)據(jù),防止被他人竊聽。 認證密碼保密性目的是保護SIM和AC只存儲的認證密碼,防止被他人竊取或復制SIM。 2.認證性平安技術業(yè)務可分為三類,它們的具體描述如下: 用戶身份認證性目的是鑒別移動用戶身份。防止假冒用戶。 網(wǎng)絡身份認證性目的是鑒別網(wǎng)絡身份,防止主動攻擊者假冒網(wǎng)絡進行欺騙。 信令數(shù)據(jù)的完整性檢測目的是保護無線信道中傳送的信令信息完整性,防止被他人篡改。 3.應用層平安技術業(yè)務 上述

19、兩類平安業(yè)務是在移動通信網(wǎng)絡的訪問層提供。隨著安防移動通信網(wǎng)絡類別培多和電子商貿(mào)開展,在應用層增設了平安技術業(yè)務,它們的具體描述如下: 實體身份認證,兩個應用實體互相認證對方的身份; 數(shù)據(jù)源認證,接收方應用實體認證數(shù)據(jù)確實來自于發(fā)送方; 數(shù)據(jù)完整性認證,接收方應用實體確認接收到的數(shù)據(jù)沒有被篡改; 數(shù)據(jù)保密性,保護兩應用實體之間的數(shù)據(jù)通信,實現(xiàn)端到端保密性,防止流分析; 數(shù)據(jù)接收證明,送方應用實體認證可證明接收方確實收到了應用數(shù)據(jù)。 3 移動 保護 移動 商為每部移動 分配一個全球唯一的國際移動設備號IMEI,每當移動 訪問移動通信網(wǎng)

20、絡,它必須傳其IMEI給網(wǎng)絡端設備號登記處EIR;EIR檢查廬IMEI是否在喪失和失竊移動 的名單上,假設在那么EIR就傳一個信令將該移動 鎖起來,此時使用者自己不能開鎖,就不能繼續(xù)使用這個移動 ,這個方法在很大程度上防止了非法用戶撿來或偷來的移動 濫用網(wǎng)絡效勞,而由喪失移動 的合法用戶付費,但是也有一些不法分子應用高科技工具改變偷來的 的IMEI,從而通過名單檢查。為防止修改移動 的IMEI,移動 生產(chǎn)商通常將IMEI設置在一個保護的單元――具有物理防撬功能的只讀存儲器。 無線通信網(wǎng)絡中存在的不平安因素對網(wǎng)絡用戶和網(wǎng)絡經(jīng)營者經(jīng)濟利益構成威脅,為保護他們的利益

21、,無線電通信網(wǎng)絡必須應用上述相關技術的平安業(yè)務來消除不平安因素給網(wǎng)絡用戶帶來的威脅。隨著無線通信技術不斷開展,無線通信網(wǎng)絡的應用不僅深入到國防軍事、科研教育、醫(yī)療衛(wèi)生等國民經(jīng)濟諸多領域,并已深入到千家萬戶的日常生活。無線通信網(wǎng)絡應用越廣泛,它的平安性就越加重要。 外文參考文獻原文 THE SECURITY OF BULDING MOBILE COMMUNICATION TECHNOLOGY 1 The history of building mobile network Building communications network is a

22、n important application field and ingredient in radio communication technology, which exploited and applicated from the twenties last century, then the mobile communication service used between general headquarter of police office and constable vehicle mainly―And it get application and dissemination

23、 in the branch of police promptly, telephone still is the chief communicate implement in the nowadays, the communication net of intellectualized building is the stretch of public telecommunication net,it is the largest network of the whole world.it may lack of computer network in underdeveloped area

24、, but able to have telephone network, therefore it can contact with people by the telephone network in the world. Transmiting the data and image on the telephone network,which we can use modulation and demodulation techniques. In 1946, the American AT & T company developed the radiotelephone techno

25、logy which can cannect between mobile users and immobility users. Be based upon this technology , AT & T company go a step further developed being called security mobilephone service, security mobile communicate system., I MTS system moves communications network in developing able that time unique b

26、uilding all over USA world correct talk in 1969. Bell laboratory of AT & T company had invented the cellular technology in 1968, the coverage area that it can with building world correct talk displacement communications network partition the housing estate becoming many similar beehives , has been s

27、eparated by more distant small area being able to use identical radio frequency, avoided launching the disturbance problem that power brings about highly, make housing estate base standed can adopt the low frequency launch the invention of cellular technology is a sheen landmark in the mobile commun

28、ication history,it's a times of cellular mobile communication which with it's abroaded application in building communication mobile system. The beginning of 1970's , first generation cellular building communication mobile network throwed into operation broadly in so many countries such as Japan , S

29、weden , United Kingdom , USA , Germany and France,and so on. The first generation cellular mobile communications network based on the analog communication technology,with the mode of frequency division multiple access, the capacitie of network can satisfy the need which use mobilephone. Have arrive

30、d at 1980's powder , have already have appeared obsolete since the beehive simulating first generation generation of technology moves communications network, the progress of integrated circuit technology had driven the digital communication technology which in the security cellular mobile communicat

31、ion network, Bandwidth need communicating by letter if the advanced figure pronunciation code technology may deplete on the premise of mass in guarantee implication have improved network frequency channel resource utilization ratio.The error control technology has strengthened the network anti-inter

32、ference ability--- base-station can launched with low frequency, digital encryption technology being able to protect consumer pronunciation , data and network instruction having digitize, The ID card technology can distinguish the dignity moving a consumer , have an effect to guard against dignity c

33、ounterfeit. Therefore compared with the first,the second generation cellular mobile communication network was high performance, but not better and safer.In the 1990, Global System for Mobile Communication(GSM) take the lead in beginning to work in Europe every country. Europe avoided the first gener

34、ation Cellular mobile communication network system a lot of difficult position not communicating with each other. Based on the Frequency Division Multiple Access (FDMA),the GSM expanded its capability with Time Division Multiple Access. Thereafter,Aussie , China and a few Middle East countries adopt

35、 the GSM network also in succession afterwards, the feasible GSM network becomes largest displacement of in the world coveraged range mobile communications network. Along with the inosculated of Internet and the building mobile telecomunication in the 20 centuries 90 fuse. Low-rated data transmissi

36、on business is already having no way to satisfy the need moving consumer , the need leading data transmission business to high speed is driving moving communications network trend third generation. Therefor, International Telecommunication Union (ITU) proposes that right away working out a unified t

37、hird generation of the whole world Cellular building mobile communications network standard―future common dry land moves the telecommunication network. In October , 1998 the telecommunication standard organization in October , Europe , China , Japan , Korea Republic and American is allied self with

38、 having set up the 3rd Generation Partnership Project. Tin the beginning of this century,hird generation building mobile comunications network begined to be put in used, In taked the leaded in being in motion and doing business on October 1 , 2001, third mobile communications network on behalf of t

39、he Japanese DoCoMo company. All above our have recollected building world correct talk displacement simplely communicating by letter over and present situation progress and people in science and technology drive down to doubleness moving communication service need, the field develops the building wo

40、rld forward to talking to move communications network will still going on without a break , the communication service realizing extensive building mobile communication consummate moving the consumer who communicates by letter needs. 2 Insecure ingredient of mobile communicat

41、ion network A lot of insecure factor inthe radio communication network,such as wireless wire tapping, figure personate, juggle data and so on.Building world these are insecure to being talking as same existence of network one kind of type of radio communication to move communications network factor

42、, since building world correct talk moves the communications network particularity, it is returning existence back other insecure type factor. Following will hold and move concrete behaviour in holding respectively analytical insecure three headquarters factors among them , moving communications net

43、work as well as defending against in safety from the interface , network mobilecommunications network take form and their damage. 2.1 insecure factor of wireless interface In building mobile communication network k, mobile station communicating by letter with the fixation network possessions betwe

44、en end all is by the fact that the wireless interface comes to transfer ,but the wireless interface is open, the malefactor may eavesdrop a route by wireless interface but get transmission information among them, information in even, being able to revise , intervening in , deleting or revaluing the

45、wireless interface of biography, reaches the purpose palming off displacement consumer dignity to cheat the network terminal. According to the diversity attacking a type's, must authorize to visit a headquarter data , must authorize to visit the network service , threaten three kinds data completene

46、ss detachable detachable. (1) disaccredit accessing data attack The chief intention of disaccredit accessing data attack is to gainning data or message. Whose method has as follows several kinds. Eavesdrop consumer data -gaining consumer information content. wiretapping believe data,Gain networ

47、k administration information and information other beneficial to attacking on self's own initiative. wireless follow up the scent,Gain dignity and location information moving a consumer , realize wireless tracking. passiveness transmit analyzing,ake a guess on consumer communicate by letter conten

48、t and purpose. initiative transmit analyzing- Gain visit information. (2) disaccredit accessing administration of networks attack And in must authorize to visit network service kind attack, the attacker cheats a network of end by palming off a legal displacement consumer coming dignity , acquisit

49、ion authorizes to visit the network service, and escape from paying, the consumer pays from the displacement being palmed off for the attacker. (3) intimidatory data integrated attack Threatening the target that the data completeness kind attacks is consumer data stream in wireless interface and m

50、essage order data stream , the attacker deletes by modification , insertion, or weight biography realizes coming these data stream the purpose cheating a data of a receiving party's, reach some kind of attack intention. 2.2 insecure factor of network In building mobile communications network, the

51、 composition that the network holds is comparatively complicated, not only its contain many function elements , but also communication medium is also be unable completely identical between different element. Move the end communications network therefore defending against ampere same existence a few

52、assignable insecure factors eavesdroping if wireless , denying after dignity is counterfeit , tamper with a data and serve and so on. According to the diversity attacking a type's, have four resemble as follows. (1) disaccredit accessing data attack disaccredit accessing data attack to visit the c

53、onsumer data or message order data that the major objective lie in that the data attacks transfers between gaining a network holding an element, concrete method has as follows several kinds. Wiretapping users data:Gain consumer communicate by letter content. wiretapping believedata:Gain network ad

54、ministration information andinformation other beneficial to attacking on self's own initiative. wireless follow up the scent:Gain dignity and location information moving a consumer , realize wireless tracking. counterfeit communication recieve:Gain the consumer data , message order data and inform

55、ation other beneficial to attacking on self's own initiative. Visit the data that system stores illegally:Gain the data storing in system if the attestation of legal consumer parameter waits. (2) disaccredit accessing network service attack disaccredit accessing network service attack to visit th

56、e major objective that attacks being to visit a network but to evade pay a sum of money of , concrete manifestation having growing as follows almost: counterfeit legitimate,warrant gaining the visit network service. counterfeit service network,visit the network service. counterfeit adscription,ga

57、in the attestation parameter being able to palm off legal consumer dignity. abuse user authority – feast network service without any pay. abuse network service authority-Gain gain a profit of illegally. (3) Threaten entire attack of data building mobile communication the threat data completeness

58、 kind that communications network holds attacks those in including the wireless interface not only threatening data completeness kind attack , is a wireless interface because of the communication interface between BSS and MSC is also possible. And, fairly include wired communications network , concr

59、ete behaviour as follows: control user’s data,Gain the network service visiting right or disturb deliberately to communicate by letter. control persuasion data,Gain the network service visiting right or disturb deliberately to communicate by letter. counterfeit communication visitor, Gain the n

60、etwork service visiting right or disturb deliberately to communicate by letter. control download application,Disturb the regularwork of mobile terminal. control mobile terminal : Disturb the regularwork of mobile terminal. Control the data of the network stores in the element: Gain the network se

61、rvice visiting right disturbing communication deliberately. 2.3 insecure factor of miton the displacement moving communications network communications network holds building world correct talk is to be composed of station , moving a station is that it is preserving the individual information movin

62、g a consumer not only move a consumer visiting the communication implement mobile telecommunication networks,such as moving equipment international dignity number ,mobile consumer international dignity number , mobile consumer dignity attestation password and so on. Moving equipment international di

63、gnity number IMEI is a corresponding a legal consumer representing a cellular phone uniquely, but moving consumer international dignity number and the displacement consumer dignity attestation password also unique. as follows insecure since cellular phone has been brought about by cellular phone ea

64、sy to be lost or be stolen, from this in the daily life factor: Use the loss stealing or collecting the cellular phone coming on visiting the network service , being needless to pay , having been brought about economy by the consumer who loses cellular phone. The lawbreaker moves the consumer's in

65、ternational dignity number and moves the consumer dignity attestation secret key if reading out, the lawbreaker can copy a lot of cellular phone - engaged in illegal cellular phone business , give cellular phone consumer and network service business to have brought about upper loss of economy. The

66、 lawbreaker may change the number stealing or selecting cellular phone dignity coming , prevent from on this account being registered to wait a minute on the blacklist losing cellular phone. 2.4 The risk of attack The menace of the building mobile communication such as: Wireless eavesdrop , counterfeit attack , completeness infringe upon,business denies and moves telephone to attack wait a minute,concrete description as follows: Wireless eavesdrop,eavesdrop the consumer dignity number delive

展開閱讀全文
溫馨提示:
1: 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
2: 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
3.本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
5. 裝配圖網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

相關資源

更多
正為您匹配相似的精品文檔
關于我們 - 網(wǎng)站聲明 - 網(wǎng)站地圖 - 資源地圖 - 友情鏈接 - 網(wǎng)站客服 - 聯(lián)系我們

copyright@ 2023-2025  zhuangpeitu.com 裝配圖網(wǎng)版權所有   聯(lián)系電話:18123376007

備案號:ICP2024067431-1 川公網(wǎng)安備51140202000466號


本站為文檔C2C交易模式,即用戶上傳的文檔直接被用戶下載,本站只是中間服務平臺,本站所有文檔下載所得的收益歸上傳人(含作者)所有。裝配圖網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對上載內(nèi)容本身不做任何修改或編輯。若文檔所含內(nèi)容侵犯了您的版權或隱私,請立即通知裝配圖網(wǎng),我們立即給予刪除!

五月丁香婷婷狠狠色,亚洲日韩欧美精品久久久不卡,欧美日韩国产黄片三级,手机在线观看成人国产亚洲