Difference between revisions of "Pubs:2010"
(Created page with "<bibtex>@article { 484, title = {Security Analysis of Wireless Mesh Backhauls for Mobile Networks}, journal = {Journal of Network and Computer Applications}, volume = {In Pres...") |
|||
Line 7: | Line 7: | ||
pages = {--}, | pages = {--}, | ||
publisher = {Elsevier}, | publisher = {Elsevier}, | ||
− | abstract = { | + | abstract = {This article extends prior security threat analyses of 3rd generation mobile network architectures for the case of wireless mesh backhauls. It presents a description of the security model for the considered architecture and provides a list of the basic assumptions, security objectives, assets to be protected and actors of the analysis. On this foundation, potential security threats are analyzed and discussed and then assessed for their corresponding risk. The result of this risk assessment is then used to define a set of security requirements. Finally, we give some recommendations for wireless mesh backhaul designs and implementations following these requirements.}, |
− | |||
− | This article extends prior security threat analyses of 3rd generation mobile network architectures for the case of wireless mesh backhauls. It presents a description of the security model for the considered architecture and provides a list of the basic assumptions, security objectives, assets to be protected and actors of the analysis. On this foundation, potential security threats are analyzed and discussed and then assessed for their corresponding risk. The result of this risk assessment is then used to define a set of security requirements. Finally, we give some recommendations for wireless mesh backhaul designs and implementations following these requirements.}, | ||
keywords = {Security analysis, Wireless mesh backhauls, Mobile networks}, | keywords = {Security analysis, Wireless mesh backhauls, Mobile networks}, | ||
author = {Frank A. Zdarksy, Sebastian Robitzsch, Albert Banchs} | author = {Frank A. Zdarksy, Sebastian Robitzsch, Albert Banchs} |
Revision as of 14:50, 4 March 2012
<bibtex>@article { 484, title = {Security Analysis of Wireless Mesh Backhauls for Mobile Networks}, journal = {Journal of Network and Computer Applications}, volume = {In Press}, year = {2010}, month = {04/2010}, pages = {--}, publisher = {Elsevier}, abstract = {This article extends prior security threat analyses of 3rd generation mobile network architectures for the case of wireless mesh backhauls. It presents a description of the security model for the considered architecture and provides a list of the basic assumptions, security objectives, assets to be protected and actors of the analysis. On this foundation, potential security threats are analyzed and discussed and then assessed for their corresponding risk. The result of this risk assessment is then used to define a set of security requirements. Finally, we give some recommendations for wireless mesh backhaul designs and implementations following these requirements.}, keywords = {Security analysis, Wireless mesh backhauls, Mobile networks}, author = {Frank A. Zdarksy, Sebastian Robitzsch, Albert Banchs} }
</bibtex>