通信学报 ›› 2013, Vol. 34 ›› Issue (Z1): 176-181.doi: 10.3969/j.issn.1000-436x.2013.z1.023

• 技术报告 • 上一篇    下一篇

LTE-A中继场景下切换的安全处理研究

吴昊,王涛,吴韶波   

  1. 北京交通大学 轨道交通控制与安全国家重点实验室,北京100044
  • 出版日期:2013-08-25 发布日期:2017-06-23
  • 基金资助:
    国家自然科学基金资助项目;教育部科学技术研究重大基金资助项目

Research on relay related handover security in LTE-A

Hao WU,Tao WANG,Shao-bo WU   

  1. State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing 100044,China
  • Online:2013-08-25 Published:2017-06-23
  • Supported by:
    The National Natural Science Foundation of China;Key Grant Project of Chinese Ministry of Edu-cation

摘要:

中继作为LTE-A的关键技术之一,既能优化网络覆盖,还可以提高系统容量。然而中继的引入也为系统带来了诸多安全挑战。分析了中继部署场景下用户终端切换时的安全问题,给出不同切换场景模式的安全解决方案,以保证切换后通信的正常进行,并且通过建立Petri网络模型对所设计流程进行了分析。最后,对移动中继切换时的安全处理进行了讨论。

关键词: LTE-A, 中继, 安全, 切换处理

Abstract:

As one of the key technologies in LTE-A, relay can both optimize coverage of the network and increase the system capacity. However, the introducing of relay also brings many security challenges to the system. The security is-sues in relay related handover processes were mainly analyzed, and then the corresponding solutions were proposed for security handling. With those solutions, mobile users in the network can communicate effectively after the handover proc-ess. The designed process was also analyzed by using Petri network model. Finally, the handover security of mobile relay was discussed.

Key words: LTE-A, relay, security, handove

[1] 张 源,高西奇. 三节点无线高斯中继信道容量分析[J]. 通信学报, 2006, 27(7): 21 -134 .
[2] 姜开达,章思宇,孙 强. 基于NTP反射放大攻击的DDoS追踪研究[J]. 通信学报, 2014, 35(Z1): 7 -35 .
[3] 杨红梅,梁永全,刘连山,纪淑娟. 基于HVS的彩色图像水印视觉不可感知性评价方法[J]. 通信学报, 2008, 29(2): 14 -100 .
[4] 孙佩刚,赵 海,罗玎玎,张希元,朱 剑. 无线传感器网络链路通信质量测量研究[J]. 通信学报, 2007, 28(10): 3 -22 .
[5] 冯 超,张 权,唐朝京. 计算可靠的Diffie-Hellman密钥交换协议自动证明[J]. 通信学报, 2011, 32(10): 15 -126 .
[6] 杨 凯,刘 全,张书奎,李 瑾,翁东良. 利用移动内点来修复传感器网络空洞的算法[J]. 通信学报, 2012, 33(9): 14 -124 .
[7] 王晓鸣,蒋鑫. TD Femto系统安全问题研究[J]. 电信科学, 2010, 26(12): 23 -26 .
[8] 肖潇,陶晓明,陆建华. 基于高能效无线接入网的绿色无线通信关键技术研究[J]. 电信科学, 2011, 27(11): 75 -83 .
[9] 朱 江,沈庆国,汪 莉. 基于漏桶的内容适配系统接纳控制[J]. 通信学报, 2007, 28(1): 20 -134 .
[10] 吴志军,岳 猛. 低速率拒绝服务LDoS攻击性能的研究[J]. 通信学报, 2008, 29(6): 14 -93 .