[1] |
KANCHEI L , WU C C , SHEU S T . IMT-advanced relay standards[J]. IEEE Communications Magazine, 2010,48 (8):40-48.
|
[2] |
王竞, 刘光毅 . LTE-Advanced系统中中继技术研究和标准化[J]. 电信科学, 2010,26(12):138-143. WANG J , LIU G Y . Research and standardization of relay in LTE-ad-vanced[J]. Telecommunications Science, 2010,26(12):138-143.
|
[3] |
SALEM M , ABDULKAREEM A , YANIKOMEROGLU H . Opportu-nities and challenges in OFDMA-based cellular relay networks: a ra-dio resource management perspective[J]. IEEE Transactions on Ve-hicular Technology, 2010,59 (5):2496-2510.
|
[4] |
宋斌, 何锟 . 中继技术在LTE-Advanced系统中的应用[J]. 广东通信技术, 2009,29(12):40-43. SONG B , HE K . The Application of Relay in LTE-Advanced Sys-tems[J]. Guangdong Communication Technology. 2009,29(12):40-43.
|
[5] |
3GPP TR 33.816. Feasibility Study on LTE Relay Node Security[S]. 2011.
|
[6] |
3GPP TR 33.801. Access Security Review[S]. 2012.
|
[7] |
HERCEG D . LTE transport security[A]. The 34th International and Communication Technology, Electronics and Microelectronics[C]. MIPRO, Opatija, 2011.1464-1467.
|
[8] |
HAN C K , CHOI H K , JUNG W Z . Evaluation of authentication sig-naling loads in 3GPP LTE/SAE networks[A]. IEEE 34th Conference on Local Computer Networks (LCN 2009)[C]. Zurich, Switzerland, 2009.37-44.
|
[9] |
HUANG X L . Ulupinar fatih, agashe parag, LTE relay architecture and it's upper layer solutions[A]. IEEE Global Telecommunications Con-ference (GLOBECOM 2010)[C]. Miami, 2010.1-6.
|
[10] |
SHI Z Y , JI Z L , GAO Z B . Layered security approach in LTE solution and simulation[A]. Proceedings of the 3rd International Conference on Anti-Counterfeiting, Security and Identification in Communication[C]. Hong Kong, 2009.171-173.
|
[11] |
3GPP TR 33.859. UTRAN Key Management Enhancement[S]. 2012.
|
[12] |
FORSBERG D . LTE key management analysis with session keys context[J]. Computer Communications, 2010,33 (16):1907-1915.
|
[13] |
LIU H , SONG J L . Research and implementation of encryption and integrity protection in LTE access stratum[A]. Asia-Pacific Youth Conference on Communication Technology (APYCCT 2010)[C]. Kunming, China, 2010.37-41.
|
[14] |
MUN H , HAN K , KIM K . 3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA[A]. 2009 Wireless Telecommunications Symposium[C]. Prague, 2009.309-316.
|
[15] |
LIU H , BAI S . Research and implementation of LTE NAS security[A]. International Conference on Educational and Information Technology Proceedings (ICEIT 2010)[C]. Chongqing, China, 2010.453-456.
|
[16] |
RAJAVELSASMY R , CHOI S . Security aspects of inter-access system mobility between 3GPP and non-3GPP networks[A]. 2008 3rd Interna-tional Conference on Communication System Software and Middle-ware and Workshops[C]. Bangalore, 2009.209-213.
|
[17] |
ZHANG Y C , LIU W , LOU W J , et al. Location-based compro-mise-tolerant security mechanisms for wireless sensor networks[J]. IEEE Journal on Selected Areas in Communications, 2006,24 (2):247-260.
|