Mobile backhaul network
A backhaul network and network technology, applied in the field of communication, can solve problems such as the direct application of NDS architecture, and achieve the effect of simple implementation method and security guarantee
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] This embodiment provides a security protection architecture for a mobile backhaul network, which is applicable to a trusted backhaul network scenario.
[0049] In this scenario, eNBs are trusted by the operator, for example, eNBs belong to the operator, and eNBs have physical protection mechanisms such as security monitoring or special personnel protection. The backhaul link is also trusted for the operator, for example, the backhaul link belongs to the operator, and the backhaul link has L2VPN or L3VPN protection. The core network elements in this scenario also belong to the operator and have corresponding security protection mechanisms. In this scenario, eNBs, backhaul connections and core network elements belong to the same operator, and they are located in the same security domain, so this scenario is a trusted backhaul network for the operator, and the backhaul information protection mechanism adopts optional security Interface Zb. In addition, operators can divi...
Embodiment 2
[0058] This embodiment provides a security protection architecture for a mobile backhaul network, which is applicable to a network scenario where a core network and an access network are located in different security domains.
[0059] In this scenario, eNBs may not be fully trusted for operators, for example, eNBs are deployed in an incompletely trusted security domain and lack physical security protection; or considering the importance of network elements, no access The NEs of the core network are isolated from the NEs of the core network. The backhaul link may also be untrusted to the operator, such as via leased line or Internet transmission, or the backhaul link may not be secured. This scenario is not completely trustworthy for the operator, so it is divided into different security domains. The information between different domains is protected by the mandatory security interface Za, and the backhaul information in the same security domain is protected by the optional sec...
Embodiment 3
[0070] This embodiment provides a mobile backhaul network security architecture, which is applicable to a network scenario where a core network and an access network are located in different security domains.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 