Next Generation Mobile Systems 3G and Beyond phần 1 doc

41 191 0
Next Generation Mobile Systems 3G and Beyond phần 1 doc

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... 15 7 15 7 15 8 15 8 15 9 15 9 16 0 16 1 16 1 16 2 16 3 16 8 17 4 17 6 17 6 17 8 18 0 18 0 18 2 18 5 4.5 4.6 Mobility Support 4.4 .1 Fast Channel Scanning 4.4.2 Fast Authentication Quality of Service 4.5 .1 EDCA and HCCA Security ix 6 APIs and Application Platforms for Next- generation Mobile 6 .1 Introduction... 93 93 94 97 97 10 2 10 5 10 7 10 7 10 8 10 8 10 9 11 0 11 0 11 0 CONTENTS 4.4 11 1 11 1 11 4 12 1 12 1 12 5 5 IP Mobility 5 .1 Introduction 5.2 The Internet Architecture 5.2 .1 The End-to-end Principle 5.2.2 Internet... Intertechnology Handover 5.4.4 Candidate Access Router Discovery (CARD) 5.5 Summary 12 9 12 9 13 1 13 1 13 2 13 2 13 3 13 4 13 4 13 6 13 8 14 2 15 0 15 1 15 2 15 4 15 4 15 6 Networks... Authentication, Authorization, and Accounting 11 .1 Evolution of AAA 11 .2 Common AAA Framework 11 .3 Technologies 11 .3 .1 RADIUS and Diameter 11 .3.2 Extensible Authentication Protocol 11 .3.3 PANA 11 .3.4 WLAN 11 .3.5 IP-based Cellular Networks 11 .4 Emerging Research... 1. 1 shows the generations, their transport technologies, and applications .1 In Figure 1. 1, we summarize major functionalities of each generation as follows 1G: Basic mobile telephony service 2G: Mobile telephony service for mass users with improved ciphering and efficient utilization of the radio spectrum Figure 1. 1 Generation of mobile networks 1 The technical distinctions and definitions of 1G 3G mobile. .. 11 .4 .1 AAA for Access Networks with Ad hoc Extensions 11 .4.2 802 .11 i Handover Optimizations 11 .4.3 Unified AAA 315 316 317 319 320 3 21 323 328 334 338 338 340 3 41 12 Security Policy Enforcement for Downloaded Code 12 .1 Introduction 12 .2... IV Security 10 Cryptographic Algorithms and Protocols for XG 10 .1 Introduction 10 .1. 1 The Challenge of Securing XG 10 .1. 2 Chapter Overview 10 .2 Secret-key Cryptography 10 .2 .1 Some History 10 .2.2 GSM 10 .2.3 3GPP and Kerckhoff’s Principle 10 .3 Public-key... 12 .2 Standard Dynamic Monitors: Java 2 12 .2 .1 Stack-inspecting Dynamic Monitors 12 .3 Selective Dynamic Monitors 12 .3 .1 Wallach et al.: Capabilities and Namespaces 12 .3.2 Erlingsson and Schneider: Security Automata 12 .3.3 Evans and Twyman: Abstract Operating Systems 12 .3.4 Pandey and Hashii: Benchmarks 12 .3.5 Kim et al.:... 287 287 288 289 2 91 2 91 292 294 295 296 297 297 298 299 300 3 01 303 303 xii CONTENTS 10 .6.2 Coping with Heterogeneity 10 .6.3 Efficient Cryptographic Primitives 10 .6.4 Cryptography and Terminal Security 10 .6.5 Other Research Directions 10 .7 Conclusion 308 311 312 313 314 11 Authentication,... meanings Next- generation mobile system This refers to the whole (beyond 3G) mobile communication system in its entirety, including the whole technology “value chain” of the wireless ecosystem from the service platform, through the core and access networks to the user terminal and applications Next- generation mobile network This refers to a subset of the Next- generation Mobile System” defined above The Next- generation . for the Next Generation 1 1 Evolution of Mobile Networks and Services 3 1. 1 TheEvolutionofMobileNetworks 4 1. 2 TrendsinMobileServices 6 1. 3 WhyNext -generation( XG)MobileSystems? 9 1. 4 Next- generationImperatives. . . . . 319 11 .3 .1 RADIUSandDiameter 320 11 .3.2 ExtensibleAuthenticationProtocol 3 21 11. 3.3 PANA 323 11 .3.4 WLAN 328 11 .3.5 IP-basedCellularNetworks 334 11 .4EmergingResearch 338 11 .4 .1 AAA for. . 11 1 4.4 .1 FastChannelScanning 11 1 4.4.2 FastAuthentication 11 4 4.5 Quality of Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1 4.5 .1 EDCAandHCCA 12 1 4.6 Security 12 5 5

Ngày đăng: 14/08/2014, 09:21

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan