Standards Driven Security Assurance for Mobile Networks

被引:0
|
作者
Lachmund, Sven [1 ]
机构
[1] Deutsche Telekom, Germany
来源
Journal of ICT Standardization | 2015年 / 3卷 / 02期
关键词
Standardization;
D O I
10.13052/jicts2245-800X.321
中图分类号
学科分类号
摘要
Anew security assurance scheme for mobile network infrastructure equipment is described in this article. In introducing an effective security assurance scheme, constraints need to be considered as the environment in which the scheme is introduced defines some boundaries. Technology is not the only aspect that counts and it is necessary to achieve a real balance between technical and organisational security improvement, visibility of security levels of network equipment, operational feasibility, and market acceptance and participation. The end goal is to involve a range of stakeholders that need to commit to the scheme so the likely effectiveness, cost, effort and complexity are important parameters that need to be taken into consideration. The mobile industry operates worldwide and thrives on the development of open standards by multiple standards development organisations. Solutions that are designed and agreed must meet the needs of all involved stakeholders around the world to secure support for their delivery to market. This paper explains how standardisation works in and for the mobile industry and introduces the objectives, the constraints, the reasons for developing a security assurance scheme, and describes the proposed scheme for mobile network equipment and lifecycle processes. The article illustrates that the new Network Equipment Security Assurance Scheme (NESAS), as it is called, meets the various and different needs of mobile network operators, network equipment vendors, and regulators in a time of ever growing complexity of mobile networks. © 2016 River Publishers. All rights reserved.
引用
收藏
页码:105 / 132
相关论文
共 50 条
  • [21] Security issues in mobile information networks
    Hardjono, T
    Seberry, J
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1021 - 1026
  • [22] Reducing security overhead for mobile networks
    Zhang, FG
    Mu, Y
    Susilo, W
    19th International Conference on Advanced Information Networking and Applications, Vol 1, Proceedings: AINA 2005, 2005, : 398 - 403
  • [23] Security in Mobile ADHOC Networks: Survey
    Kariyannavar, Sharat S.
    Thakur, Shreyas
    Maheshwari, Aastha
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 135 - 143
  • [24] Security in vehicular networks for the mobile Internet
    Lindlbauer, Marc
    AUTOMOTIVE SECURITY, 2007, 2016 : 185 - 200
  • [25] Broadcast Security in Future Mobile Networks
    Rohlik, M.
    Vanek, T.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (10) : 69 - 75
  • [26] Security Service Technology for Mobile Networks
    Aiqun Hu Tao Li Mingfu Xue(Information Security Research Center of Southeast University
    ZTE Communications, 2011, 9 (03) : 49 - 54
  • [27] SIP for Mobile Networks and Security Model
    Wan, Huaxu
    Su, Guiping
    Ma, Hongyran
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 1809 - +
  • [28] Security aspects in future mobile networks
    Bakmaz, Bojan
    Bakmaz, Miodrag
    Bojkovic, Zoran
    PROCEEDINGS OF IWSSIP 2008: 15TH INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING, 2008, : 479 - 482
  • [29] Security Solutions in Mobile Autonomic Networks
    Aljnidi, Mohamad
    Leneutre, Jean
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2101 - 2106
  • [30] Security issues in mobile data networks
    Nayak, D
    Rajendran, N
    Phatak, DB
    Gulati, VP
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3229 - 3233