Skip to main content

Security of Dedicated Mobile Communications for Railway

  • Chapter
  • First Online:
Book cover Dedicated Mobile Communications for High-speed Railway

Abstract

In this chapter covers security schemes of dedicated mobile communications for railway. Due to the control signal is transmitted via wireless channel, communication security is crucial to the whole rail transit system. Although currently the mobile communication infrastructure in railway is based on public cellular mobile communications, considering the rail transit has characteristics of ultra-high moving velocity and high reliability and safety demand, traditional security mechanism is unable to satisfy the basic requirements of the rail transit scenario. On the one hand, there are still some threats remained in GSM-R. On the other hand, the future dedicated mobile network for railway is heterogeneous and complicated, including 2G, 3G, 4G, WLAN networks, and mobile relays. How to achieve fast authentic handover scheme across domains is a problem that must be solved. In this chapter, we first introduce the security problems in mobile communications. Next, we describe in detail the key improvements of railway communication technology. Finally, we introduce some key technologies in heterogeneous network environment and give a brief prospect of the future research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xu S, Ma W, Wang X (2003) Security technology in wireless communication network. Posts and Telecom Press, Beijing, pp. 36–41

    Google Scholar 

  2. Vines RD (2002) Wireless security essentials: defending mobile systems from data piracy. Wiley Publishing, New York

    Google Scholar 

  3. Maxim M, Pollino D (2002) Wireless security. McGraw-Hill, Maidenhead

    Google Scholar 

  4. Liu Y, Fan Z (2004) Analyses and countermeasures of GSM—R network security. Railw Signal Commun Eng 6:27–30

    Google Scholar 

  5. Song Y, Zhou K, Yao B, Chen X (2010) A GSM/UMTS Selective Jamming System. International Conference on Multimedia Information Networking and Security

    Google Scholar 

  6. Zhang M, Fang Y (2005) Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Trans Wirel Commun 1(12):734–742

    Article  Google Scholar 

  7. Wu H, Shi X, Gu Y (2009) Research and improvement on security of GSM-R system. J Beijing Jiaotong Univ 33(2):127–1301

    Google Scholar 

  8. Zeidler HM (1986) End-to-end encryption system and method of operation. US, US 4578530 A

    Google Scholar 

  9. Al-Fayoumi MA, Shilbayeh NF (2014) Cloning sim cards usability reduction in mobile networks. J Network System Management 22(2):259–279

    Google Scholar 

  10. Wu H, Gu YH, Zhong ZD (2013) One type of GSM-R fast handover algorithm for high-speed railway. In: IET, international conference on wireless, Mobile and Multimedia Networks, IET, pp.175–178

    Google Scholar 

  11. Black J, Halevi S, Krawczyk H, Krovetz T, Rogaway P (1999) UMAC: fast and secure message authentication. In: Advances in cryptology - CRYPTO '99, international cryptology conference, Santa Barbara, California, Usa, August 15–19, 1999, Proceedings (Vol.1666, pp.216–233), DBLP

    Google Scholar 

  12. Asokan N, Ekberg JE, Kostiainen K, Rajan A, Rozas C, Sadeghi AR et al (2014) Mobile trusted computing. Proceed IEEE 102(8):1189–1206

    Google Scholar 

  13. Madlmayr G (2008) A mobile trusted computing architecture for a near field communication ecosystem. In: iiWAS'2008 - The tenth international conference on information integration and web-based applications services, 24–26 November 2008, Linz, Austria (pp.563–566), DBLP

    Google Scholar 

  14. Chengdu (2006) Trusted computing based user authentication for mobile equipment. Chinese J Comput 29(8):1255–1264

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhang-Dui Zhong .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Beijing Jiaotong University Press and Springer-Verlag GmbH Germany

About this chapter

Cite this chapter

Zhong, ZD. et al. (2018). Security of Dedicated Mobile Communications for Railway. In: Dedicated Mobile Communications for High-speed Railway. Advances in High-speed Rail Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-54860-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-54860-8_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-54858-5

  • Online ISBN: 978-3-662-54860-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics