Security for the Third Generation (3G) Mobile System
#1

Security for the Third Generation (3G) Mobile System

[attachment=17989]
1 Introduction
When considering security in mobile systems, in common with most other systems, our main
objectives are in preventing:
· Access and use of service to avoid or reduce a legitimate charge.
· Loss of confidentiality or integrity of a user’s or operator’s data
· Denial of a specific user’s access to their service or denial of access by all users to a service
However, user expectations for instant communication and ease of use, as well as terminals which are
easily lost or stolen, present a number of unique challenges in the mobile environment.
The original first generation analogue mobile employed a simple electronic serial number to confirm
that the terminal should be allowed access to the service. It was not long before the protection afforded
to this number was broken. Eventually, devices appeared that could read these electronic serial
numbers from the air, and access an unsuspecting user’s account for a short time, before moving on to
the next, in the hope that the small charges on each bill would not be noticed. So why was this not
predicted at the time? Unfortunately, there always seems to be an assumption, with any new
development in communications technology, that complexity alone will protect such services from
abuse.



2 3G Security Principles
It was agreed that any new security architecture must be based on an evolution of GSM and must adopt
four basic principles:
· It will take into account the additional features needed for actual or predicted change in the
operating environment
· It will maintain compatibility with GSM wherever possible
· It will retain those features of GSM that have proved to be robust and useful to the user and
network operator
· It will add or enhance features to overcome actual or perceived weaknesses in 2G system

2.1 Additional features
One of the main reasons for the development of the 3G system to make higher value services available
to as many users as possible world wide, using a universal design of the handset. However, this
increases the number of relationships, as the number of Users, Service Providers, and Network
Operators in the market expands. This increased level of service interaction increases the number of
potential attackers and the opportunities open to them. This was not too much of a problem in the initial
roll out of GSM, as there were a relatively small number of operators and the risk of compromise was
low. For 3G, the networks are getting smaller and more numerous, so opportunities for hackers and
other abusers of networks will increase. Even if deliberate abuse is not considered likely, unintentional
mishaps may occur as a result of the complexity and the rate of new service introduction.
2.2 Maintaining compatibility with GSM
A major contributor to the success of GSM has been the availability of a full system specification with
standard service sets and automatic integrated roaming. An important consideration was to make as
much use of the existing infrastructure as possible, while gradually enhancing the network as required
meeting the demand for the new services. An example of this in GSM, has been the introduction of the
General Packet Radio Service (GPRS) by the overlay of an IP core network and an additional Serving
GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) network elements. The
existing radio system is virtually unchanged retaining the Home Location Registers /Visited Location
Register (HLR/VLR) concept and operator control of security via SIM. This HLR/VLR concept
provides rapid call set up and the retention of this was considered essential for evolution of 2G to 3G.
The concept of authentication using a shared secret key was also retained.


2.3.1 SIM based Authentication
One of the most important features is that of the SIM as a removable security module which is issued
and managed by the Home Environment (HE) operator and is independent of the terminal. It was felt
that this concept had been the most significant in maintaining the security of GSM, while retaining
general user acceptance of the service. There is no need for any user action, other than perhaps entering
an optional 4 digit PIN into the terminal. User guidance on security is no more than what they are
familiar with from their bank: take care of your card, report its loss immediately and do not write the
PIN down or disclose it to anyone.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: third generation rockets components, third generation of mobile, third interview good, what is the third interview at, third generation of mobile phones seminar report, teaching nonfiction to third, third generation night vision goggles ufo,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ELECTRICITY GENERATION FROM SPEED BREAKER seminars report seminar paper 4 5,573 07-04-2016, 11:51 AM
Last Post: dhanabhagya
  Wireless LAN Security FULL REPORT seminar details 3 5,129 06-11-2014, 09:23 PM
Last Post: seminar report asees
  Siemens AG, Power Generation Germany seminar addict 2 2,822 09-04-2013, 10:46 AM
Last Post: computer topic
  Mobile Number Portability project uploader 1 2,025 11-01-2013, 12:38 PM
Last Post: seminar details
  Mobile Ad Hoc Networks project uploader 1 1,750 20-12-2012, 12:31 PM
Last Post: seminar details
  Mobile Application Development with ANDROID seminar addict 1 3,168 29-11-2012, 02:28 PM
Last Post: seminar details
  Current generation moves into wireless technology project uploader 1 1,664 27-11-2012, 01:03 PM
Last Post: seminar details
  SMART ANTENNA FOR MOBILE COMMUNICATION seminar details 1 1,596 20-11-2012, 12:27 PM
Last Post: seminar details
  GSM Based Home Security System details seminar paper 1 1,964 14-11-2012, 12:29 PM
Last Post: seminar details
  On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services project uploader 1 2,379 05-11-2012, 11:46 AM
Last Post: Guest

Forum Jump: