Preview

Security Mechanism

Better Essays
Open Document
Open Document
1190 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Mechanism
Security Mechanisms in 2G and 3G

Prasenjit Das(0710434) Student, Dept. of Computer Sc. & Engineering
National Institute of Technology Agartala, Agartala, Tripura (w), India dprasenjit83@yahoo.in Debapriya Banik(0710411)
Student, Dept. of Computer Sc. & Engineering
National Institute of Technology Agartala, Agartala, Tripura (w), India debu_nita@yahoo.com Abstract. With the advent of 2G & 3G technologies we have stepped into an era of social globalization. The GSM (also called second generation or 2G) mobile phone system uses digital signaling and speech channels. Yet several security concerns are associated with it regarding both operator & customer side. The security model designed of 2G network offers confidentiality and authentication. Authentication of the subscriber is achieved using a pre-shared key and challenge-response, whereas confidentiality is applied by encrypting the communication between the subscriber and base-station using A5/1 and A5/2 stream ciphers. However, the broadcast nature of the wireless communication and increased popularity of wireless devices introduce serious security vulnerabilities in 3G. Mobile users and providers must be assured of the correct identity of the communicating party. Encryption and Authentication are the two main security mechanisms in 3G network access securities The paper focuses on discussing all the mechanisms.

Keywords: GSM, 3G, UMTS, TMSI, A5/1, A5/2, A3, A8, KASUMI, Rijndael’s algorithm.

Introduction

Wireless communications are advancing rapidly. We are currently at the verge of a new revolutionary advancement in wireless data communications. The Universal Mobile Telecommunication system (UMTS) is a realization of third generation (3G) networks, which intend to establish a single integrated and secure network. Wireless data, multimedia applications and integrated services will be among the major driving forces behind 3G. While wireless

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 7 Lab 7.1

    • 391 Words
    • 3 Pages

    the widely used WCDMA (UMTS) based 3G networks with higher speeds for the end user that are comparable to the newer LTE networks…

    • 391 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The advent of wireless technology is due in part to the ever increasing demands for mobility and flexibility in our daily lives. A wireless LAN (WLAN) is based on cellular architecture where the system is subdivided into cells,…

    • 929 Words
    • 4 Pages
    Good Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The use of wireless technology in business and everday life is prevelant in today’s society as a whole. I have a wireless phone use, use Bluetooth and wireless internet on my laptop, as well as being able to transmit ans share internet, in my home and…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Week 8 It-242

    • 685 Words
    • 3 Pages

    For a while in the past, we refer the wireless technology as cellular phones. But now, the term "wireless" refers to more varied devices & technologies, like smartphones, computers, printers, headphones and even speakers that connects together in different ways. Today’s wireless phones for example, may include data packets like 3G & 4G cellular radio signals, Wi-Fi and even Bluetooth technologies, these technologies have advance in a fast pace that investing in equipment like 4G phone and/or 802.11x wireless routers can offer you & your business a variety of speed improvements for your money. Now I shall describe the characteristics of every type of wireless signal types so we can learn to use every signal type.…

    • 685 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    the safeguarding procedure is there to safe guard service users from any type of abuse whether it be financial, physical, sexual,verbal or neglect. Any concerns which arise in the service have to be safeguarded whethe it is by a family member or other service user' or staff member. As service provider it is our job to ensure that we follow the safeguarding policies set by local and national legislation with all service users even if the allegation is found to be untrure as a manager if there is any cause for concern then i hae to report it to protect the service user.…

    • 103 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    There is currently a variety of wireless networking capabilities that are emerging, developing, and integrating. The future of these technologies within the telecommunication industry will create better, higher-speed, and longer-distance capabilities.…

    • 4271 Words
    • 18 Pages
    Best Essays
  • Best Essays

    Wireless Technology Upgrade

    • 3174 Words
    • 13 Pages

    Kaloxylos, A., Lampropoulos, G., Merakos, L., & Passas, N. (2007, November). “A Flexible UMTS/WLAN Architecture for Improved Network Performance,” published in Wireless Personal Communications: An International Journal – Vol. 43 Issue3, 889-906.…

    • 3174 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Our online world is totally incomplete without a modem or router and nowadays, technological advancements have made it possible for us to use wireless routers which in itself is a remarkable achievement of computer science.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Overview on Ipsec

    • 2720 Words
    • 11 Pages

    * In this paper, i will introduce a overview about this security protocol: what is it? What are its core components? And how this protocol was implemented in the practical?…

    • 2720 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Wireless Security

    • 3481 Words
    • 14 Pages

    Mobile devices and wireless networks rely on a broad spectrum of technology, much of it cutting-edge. In comparison to PCs, each class of mobile device currently represents a unique hardware and software platform. Mobile phones and PDAs, for example, have varying capabilities and limitations both as computing devices and as client devices accessing corporate networks. The wireless networks that support mobile devices are similarly diverse.…

    • 3481 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    In today's twenty first century, Telecommunications networking and services are changing in a rapid way to support next generation Internet (NGI) user environment. Wireless networks will play an important and useful role in NGI. Wireless broadband networks are being increasingly deployed and used in the last mile for extending or enhancing Internet connectivity for fixed and/or mobile clients located on the edge of the wired network.…

    • 1905 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    In this research paper, I will review security issues for mobile devices using the Android platform specifically. I’ll detail threats and vulnerabilities and how android device users can better secure their devices and data.…

    • 1705 Words
    • 6 Pages
    Powerful Essays