DocumentCode
2874622
Title
Cryptographic Method of 3G Firewall Based on IXA2850
Author
Liu-Zhenyu ; Xie-Shengli ; Fu-Yuli
Author_Institution
Coll. of Electron. & Inf. Eng., South China Univ. of Technol., Guangzhou
fYear
2007
fDate
16-18 April 2007
Firstpage
280
Lastpage
283
Abstract
Through discussing the security problems of a key network protocol - the GPRS tunneling protocol (GTP), this paper points out 3rd generation network is at risk from both its own subscribers and its partner networks. So the 3G firewall should encrypt the GTP. State-of-the-art high-speed network processor-IXA2850 is described. And its features of crypto unit hardware is fit for encrypt the GTP. Cryptographic method is brought forward based on this network processor, and the experiment proves its high performance.
Keywords
authorisation; cryptography; packet radio networks; protocols; 3G firewall; 3rd generation network; GPRS tunneling protocol; IXA2850; crypto unit hardware; cryptographic method; network protocol; Cryptography; Data security; GSM; Ground penetrating radar; IP networks; Protection; Protocols; Radio access networks; Spine; Tunneling; Crypto; GTP; Network Processor;
fLanguage
English
Publisher
ieee
Conference_Titel
Anti-counterfeiting, Security, Identification, 2007 IEEE International Workshop on
Conference_Location
Xiamen, Fujian
Print_ISBN
1-4244-1035-5
Electronic_ISBN
1-4244-1035-5
Type
conf
DOI
10.1109/IWASID.2007.373744
Filename
4244830
Link To Document