Abstract
In this chapter covers security schemes of dedicated mobile communications for railway. Due to the control signal is transmitted via wireless channel, communication security is crucial to the whole rail transit system. Although currently the mobile communication infrastructure in railway is based on public cellular mobile communications, considering the rail transit has characteristics of ultra-high moving velocity and high reliability and safety demand, traditional security mechanism is unable to satisfy the basic requirements of the rail transit scenario. On the one hand, there are still some threats remained in GSM-R. On the other hand, the future dedicated mobile network for railway is heterogeneous and complicated, including 2G, 3G, 4G, WLAN networks, and mobile relays. How to achieve fast authentic handover scheme across domains is a problem that must be solved. In this chapter, we first introduce the security problems in mobile communications. Next, we describe in detail the key improvements of railway communication technology. Finally, we introduce some key technologies in heterogeneous network environment and give a brief prospect of the future research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Xu S, Ma W, Wang X (2003) Security technology in wireless communication network. Posts and Telecom Press, Beijing, pp. 36–41
Vines RD (2002) Wireless security essentials: defending mobile systems from data piracy. Wiley Publishing, New York
Maxim M, Pollino D (2002) Wireless security. McGraw-Hill, Maidenhead
Liu Y, Fan Z (2004) Analyses and countermeasures of GSM—R network security. Railw Signal Commun Eng 6:27–30
Song Y, Zhou K, Yao B, Chen X (2010) A GSM/UMTS Selective Jamming System. International Conference on Multimedia Information Networking and Security
Zhang M, Fang Y (2005) Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Trans Wirel Commun 1(12):734–742
Wu H, Shi X, Gu Y (2009) Research and improvement on security of GSM-R system. J Beijing Jiaotong Univ 33(2):127–1301
Zeidler HM (1986) End-to-end encryption system and method of operation. US, US 4578530 A
Al-Fayoumi MA, Shilbayeh NF (2014) Cloning sim cards usability reduction in mobile networks. J Network System Management 22(2):259–279
Wu H, Gu YH, Zhong ZD (2013) One type of GSM-R fast handover algorithm for high-speed railway. In: IET, international conference on wireless, Mobile and Multimedia Networks, IET, pp.175–178
Black J, Halevi S, Krawczyk H, Krovetz T, Rogaway P (1999) UMAC: fast and secure message authentication. In: Advances in cryptology - CRYPTO '99, international cryptology conference, Santa Barbara, California, Usa, August 15–19, 1999, Proceedings (Vol.1666, pp.216–233), DBLP
Asokan N, Ekberg JE, Kostiainen K, Rajan A, Rozas C, Sadeghi AR et al (2014) Mobile trusted computing. Proceed IEEE 102(8):1189–1206
Madlmayr G (2008) A mobile trusted computing architecture for a near field communication ecosystem. In: iiWAS'2008 - The tenth international conference on information integration and web-based applications services, 24–26 November 2008, Linz, Austria (pp.563–566), DBLP
Chengdu (2006) Trusted computing based user authentication for mobile equipment. Chinese J Comput 29(8):1255–1264
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Beijing Jiaotong University Press and Springer-Verlag GmbH Germany
About this chapter
Cite this chapter
Zhong, ZD. et al. (2018). Security of Dedicated Mobile Communications for Railway. In: Dedicated Mobile Communications for High-speed Railway. Advances in High-speed Rail Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-54860-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-662-54860-8_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-54858-5
Online ISBN: 978-3-662-54860-8
eBook Packages: EngineeringEngineering (R0)