JOURNAL ARTICLE

Trusted Computing-Based Security Architecture For 4G Mobile Networks

Abstract

In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security framework based on Trusted Mobile Platform (TMP) and PKI is proposed to provide a considerable robust platform for user's access to sensitive service and data in the scenario of 4G systems. Over this framework, with the combination of password and biometric identification (BI) as well as public key-based identification, an efficient hybrid authentication and key agreement (HAKA) scheme is presented to resist the possible attacks, particularly the attacks on/from ME. Compared with 3G architecture and other security schemes for 4G mobile networks, our architecture and corresponding HAKA is more secure, scalable and convenient to support globe mobility and capable of being employed to handle the complicated security issues in 4G mobile networks.

Keywords:
Computer science Computer security Trusted Network Connect Public key infrastructure Mobile computing Computer network Authentication (law) Scalability Trusted Computing Password Public-key cryptography Operating system Encryption

Metrics

33
Cited By
4.22
FWCI (Field Weighted Citation Impact)
9
Refs
0.94
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
Access Control and Trust
Social Sciences →  Social Sciences →  Sociology and Political Science

Related Documents

JOURNAL ARTICLE

A security kernel architecture based trusted computing platform

Chen You-leiShen Chang-xiang

Journal:   Wuhan University Journal of Natural Sciences Year: 2005 Vol: 10 (1)Pages: 1-4
JOURNAL ARTICLE

An efficient security architecture for trusted computing

Yin Zhixi

Year: 2009 Vol: 38 Pages: 599-601
JOURNAL ARTICLE

Security architecture of trusted virtual machine monitor for trusted computing

Qiang HuangShen Chang-xiangFang Yanxiang

Journal:   Wuhan University Journal of Natural Sciences Year: 2007 Vol: 12 (1)Pages: 13-16
© 2026 ScienceGate Book Chapters — All rights reserved.