Mobile Security
#1

[attachment=11721]
Wireless Communication Overview
• GSM
• GSM Properties

– cellular radio network
– digital transmission up to 9600 bit/s
– roaming (mobilität among different network providers, international)
– Good transmission quality (error recognition and correction)
– scalable (große Teilnehmerzahlen möglich)
– worldwide 900 million subscribers
– Europe : over 300 million subscribers
– security mechanisms provided (authentication, authorisation, encryption)
– good usage of resources (frequency- and time-multiplex)
– integration with ISDN and analogue telephone network
– standard (ETSI, European Telecommunications Standards Institute)
• GSM
GSM Security Requirements
Network provider‘s view

• correct Billing: authenticity of the user
• no misuse of the service, correct billing of content-usage
• efficiency: no more bandwidth needed for security, no long delays (user acceptance), cost-efficient
User‘s view
• confidentiality of communication (voice and data)
• privacy, no profiles of the movements of the users
• connection with authentic base station
• correct billing
Content provider‘s view
• correct billing
• GSM
Overview of GSM Security Services
Smartcard-based authentication of the user

• Identification of the through worldwide unique name IMSI
• Algorithm A3 for authentication is not public,
Confidentiality on the radio link:
• Algorithms: up to 7 A5 variants
• unique, permanent subscriber key Ki and
dynamicly generated communication keys Kc
Anonymity:
• use of temporary identities
• GSM-Architecture
• GSM-Architecture
• GSM Security
• GPRS: General Packet Radio Service
• Properties
– Packet mode service (end-to-end)
– Data rates up to 171,2 kbit/s (theoretical), effectively up to 115 Kbit/s
– Effektive und flexible Verwaltung der Luftschnittstelle
– Adaptive channel coding
– Standardised interworking with IP- and X.25 networks
– dynamic resource sharin with the „classic“ GSM voice services
– advantage: billing per volume, not per connection time
– GPRS Security Mechanisms
• Security in GPRS eng very similar to GSM
– Authentification through SGSN with Challenge-Response
– Use of temporary identities (managed through SGSN)
– Encryption algorithm A5/3 (GEA3)
– But: no end-to-end encryption
– Key generation and managment as in GSM
– No authentication and confidentiality of signalling messages within the signalling network
UMTS
• UMTS properties
– packet oriented, all-IP, 2-10 Mb/s throughput,
– Rich Telephony (voice with video, sound),
– audio-, video-streaming (movies etc.),
– better QoS, more user control,
– video-conferencing as killer application??
– worldwide roaming
– It is basically a merge of mobile telephony, wireless and paging technologies into a common system
– Support of different carrier systems
• Real time / not real time
• Line switching / packet switching
– roaming between UMTS and GSM as well as satellite networks
– asymmetric data rates for up-link/down-link
• UMTS Cell Structure
UMTS Service Concept
• UMTS Service Concept
– Virtual Home Environment (VHE): services freely configurable through user
– service quality and according cost can be chosen
– dynamic Anpassung an die Verbindung
• UPT: Universal Personal Telecommunication Service
– One subscriber number for multiple devices (call management)
– virtual mobility of the terrestric network
• UMTS Security
Adaptation of GSM security
• Confidentiality of the user identity
• Authentication of the user towards the network
• Encrypted communication over the radio link,
• SIM card as personal security module with authentication of the user towards the SIM card USIM (UMTS Subscriber Identity Module)
• UMTS Security
UMTS Extensions
– extended UMTS Authentification and key agreement
home network authenticated towards the user,
sequence numbers: prevents replay of authentication data,
keyed MAC
– Integrity of control data:
control data during connection establishment are secured with MAC
– USIM controlled use of keys
the USIM provides new authentication if the encrypted data exceed a certain volume
– Periodic key renewal
– Integrity and confidentiality of communication data:
128-bit communication key, MACs for integrity
UMTS Problems
Problems
– Interoperability between 2G, 2.5G und 3G mobile networks
– different security features: what does it mean in case of roaming between old and new networks?
• Wireless Network Infrastructures
• Wireless local area networks (WLAN) and wireless personal area networks (PAN)
• advantages
– flexibility
– Ad-hoc networks easy to establish
– No cables
– robustness
• disadvantages
– Comparatively low data rates (11 Mbit/s or 54 Mbit/s)
– Higher vulnerability on the transmission page link in comparison to cabled local area networks
– no international standards for frequency bands
– security
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ststic identities,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Home Automation & Security Control System full report seminar class 1 3,363 09-03-2012, 11:05 AM
Last Post: seminar paper
  MOBILE PHONE PROJECTOR seminar class 5 5,725 04-03-2012, 09:56 AM
Last Post: Anusha dixit
  Information Security in Electronic Toll Fare System seminar surveyer 1 1,798 13-02-2012, 02:48 PM
Last Post: seminar paper
  The MIMO-OFDM System in the 4G Mobile Communication seminarsense 1 2,900 11-02-2012, 11:07 AM
Last Post: seminar addict
  VOICE RECOGNITION SECURITY SYSTEM seminar class 1 3,200 27-07-2011, 04:56 PM
Last Post: gonitish
  RFID Systems and Security and Privacy Implications seminar class 0 1,554 30-04-2011, 04:10 PM
Last Post: seminar class
  Wireless and Mobile Networks seminar class 0 1,417 12-04-2011, 10:35 AM
Last Post: seminar class
  MOBILE TO COMPUTER NETWORKS seminar class 0 1,425 26-03-2011, 10:53 AM
Last Post: seminar class
  global system for mobile communication full report computer science technology 6 5,900 25-03-2011, 03:40 PM
Last Post: seminar class
  MOBILE COMMUNICATION USING BLUETOOTH seminar class 0 1,364 23-03-2011, 11:17 AM
Last Post: seminar class

Forum Jump: