Standards Driven Security Assurance for Mobile Networks

被引:0
|
作者
Lachmund, Sven [1 ]
机构
[1] Deutsche Telekom, Germany
来源
Journal of ICT Standardization | 2015年 / 3卷 / 02期
关键词
Standardization;
D O I
10.13052/jicts2245-800X.321
中图分类号
学科分类号
摘要
Anew security assurance scheme for mobile network infrastructure equipment is described in this article. In introducing an effective security assurance scheme, constraints need to be considered as the environment in which the scheme is introduced defines some boundaries. Technology is not the only aspect that counts and it is necessary to achieve a real balance between technical and organisational security improvement, visibility of security levels of network equipment, operational feasibility, and market acceptance and participation. The end goal is to involve a range of stakeholders that need to commit to the scheme so the likely effectiveness, cost, effort and complexity are important parameters that need to be taken into consideration. The mobile industry operates worldwide and thrives on the development of open standards by multiple standards development organisations. Solutions that are designed and agreed must meet the needs of all involved stakeholders around the world to secure support for their delivery to market. This paper explains how standardisation works in and for the mobile industry and introduces the objectives, the constraints, the reasons for developing a security assurance scheme, and describes the proposed scheme for mobile network equipment and lifecycle processes. The article illustrates that the new Network Equipment Security Assurance Scheme (NESAS), as it is called, meets the various and different needs of mobile network operators, network equipment vendors, and regulators in a time of ever growing complexity of mobile networks. © 2016 River Publishers. All rights reserved.
引用
收藏
页码:105 / 132
相关论文
共 50 条
  • [41] Security for QoS Assured Wireless and Mobile Networks
    Cesana, M.
    Boukerche, A.
    Zomaya, A.
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (03) : 239 - 241
  • [42] A framework for security analysis of mobile wireless networks
    Nanz, Sebastian
    Hankin, Chris
    THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 203 - 227
  • [43] Security Threats in Mobile Cognitive Radio Networks
    Trubin, I. S.
    PROCEEDINGS OF 2018 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS 2018), 2018,
  • [44] Software-Defined Mobile Networks Security
    Min Chen
    Yongfeng Qian
    Shiwen Mao
    Wan Tang
    Ximin Yang
    Mobile Networks and Applications, 2016, 21 : 729 - 743
  • [45] Security for Smart Mobile Networks: The NEMESYS Approach
    Gelenbe, Erol
    Gorbil, Gokce
    Tzovaras, Dimitrios
    Liebergeld, Steffen
    Garcia, David
    Baltatu, Madalina
    Lyberopoulos, George
    2013 INTERNATIONAL CONFERENCE ON PRIVACY AND SECURITY IN MOBILE SYSTEMS (PRISMS), 2013,
  • [46] Security Issues In Mobile Ad Hoc Networks
    Sarika, S.
    Pravin, A.
    Vijayakumar, A.
    Selvamani, K.
    2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016, 2016, 92 : 329 - 335
  • [47] Security Issues in Mobile Ad Hoc Networks
    Sandoval Orozco, A. L.
    Garcia Matesanz, J.
    Garcia Villalba, L. J.
    Marquez Diaz, J. D.
    Kim, T. -H.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [48] An Overview of the Security Landscape of Virtual Mobile Networks
    Ahmad, Ijaz
    Pinola, Jarno
    Harjula, Ilkka
    Suomalainen, Jani
    Harjula, Erkki
    Huusko, Jyrki
    Kumar, Tanesh
    IEEE ACCESS, 2021, 9 : 169014 - 169030
  • [49] Security mechanisms for mobile code in evolutionary networks
    Liu, Tao
    Wang, Rui
    Qian, Depei
    Gaojishu Tongxin/Chinese High Technology Letters, 2012, 22 (02): : 147 - 152
  • [50] Special issue on security in mobile wireless networks
    Benslimane, Abderrahim
    Assi, Chadi
    Huang, Fred Nen-Fu
    Kartalopoulos, Stamatios V.
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) : 99 - 101