Title :
Cryptographic Method of 3G Firewall Based on IXA2850
Author :
Liu-Zhenyu ; Xie-Shengli ; Fu-Yuli
Author_Institution :
Coll. of Electron. & Inf. Eng., South China Univ. of Technol., Guangzhou
Abstract :
Through discussing the security problems of a key network protocol - the GPRS tunneling protocol (GTP), this paper points out 3rd generation network is at risk from both its own subscribers and its partner networks. So the 3G firewall should encrypt the GTP. State-of-the-art high-speed network processor-IXA2850 is described. And its features of crypto unit hardware is fit for encrypt the GTP. Cryptographic method is brought forward based on this network processor, and the experiment proves its high performance.
Keywords :
authorisation; cryptography; packet radio networks; protocols; 3G firewall; 3rd generation network; GPRS tunneling protocol; IXA2850; crypto unit hardware; cryptographic method; network protocol; Cryptography; Data security; GSM; Ground penetrating radar; IP networks; Protection; Protocols; Radio access networks; Spine; Tunneling; Crypto; GTP; Network Processor;
Conference_Titel :
Anti-counterfeiting, Security, Identification, 2007 IEEE International Workshop on
Conference_Location :
Xiamen, Fujian
Print_ISBN :
1-4244-1035-5
Electronic_ISBN :
1-4244-1035-5
DOI :
10.1109/IWASID.2007.373744