期刊文献+

铁路无线售补票系统安全模式研究

Research on the Security Mode of Railway Wireless Ticketing and Supplementary Ticketing System
下载PDF
导出
摘要 根据铁路无线售补票系统安全体系建设目标,在分析系统安全需求的基础上,提出采用双向认证的方式对用户和终端设备进行管理的方案。对铁路无线售补票系统可能的承载网络cdma20001x的安全性,包括无线安全接入、空中接口数据机密性保护等进行了分析,指出其可能存在的安全漏洞,以及建立和完善系统应做好的工作。 According to the target of establishing security mode of railway wireless ticketing and supplementary ticketing system, on the basis of analyzing the requirement of system security, the essay puts forward a two-direction authentication scheme that could be used to manage the user and terminal unit, analyzes the security of the carrying network of railway wireless ticketing and supplementary ticketing system - cdma2000 1x, including the wireless safety connection, confidentiality protection of air-interface data, etc. The essay also points out the potential safety leak of the cdma2000 1x network, as well as the work on establishing and improving the system.
出处 《铁道运输与经济》 北大核心 2006年第12期36-39,共4页 Railway Transport and Economy
关键词 铁路 售补票系统 IC卡 安全 无线网络 railway ticketing and supplementary ticketing system IC card safety wireless network
  • 相关文献

参考文献9

二级参考文献19

  • 1刘春煌 项源金 等.中国铁路客票发售和预订系统总体设计[R].北京:铁路客票总体组,1996..
  • 2顾肇基.GSM网络与GPRS[M].北京:电子工业出版社,2001..
  • 3Wingert C,Naidu M.cdma2000 Ix RTT security:overview,August 2002,http://www.qualcomm.com/enterpfise/pdf/CDMA20001XRTT_security.pdf.
  • 4TR-45.2 Working Group.IS-41-cenhaneements for over the air service provisioning,Dec 1996.
  • 5Patel S.Weaknesses of north American wireless authentication protocol.IEEE Personal Communications,1997,4(3):40-44.
  • 6Barlow J P.Decrypting the puzzle palace.Communications of the ACM,1992,35(7):25-31.
  • 7Mechaley R.Digital telephony and cryptography policy session.In:The Third Conference on Computers,Freedom and Privacy,Burlingame.CA,1993.
  • 8Wagner D,Sehneier B,Kelsey J.Cryptanalysis of the cellular message encryption algorithm.In:Advances in Cryptology-CRYPTO'97,vol 1294 of Lecture Notes in Computer Science,springer-Verlag,1997:526-537.
  • 9Wagner D,Simpson L'Dawson E,et al.In:Cryptanalysis of ORYX,SAC'98,http://www.cs.berkeley.edu/-daw/papers/oryx—sac98.ps.
  • 10ROSE Greg.Authentication and security in mobile phones[EB/OL].http:// www.qualcomm.com.au/PublicationsDocs/AUUG99AuthSec.pdf,1999.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部