{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

cellular_security - Security In Wireless Cellular Networks...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Security In Wireless Cellular Networks file:///X:/www-docs/cse574-06/ftp/cellular_security/index.html 1 of 12 5/9/2006 7:54 PM Security In Wireless Cellular Networks Ali I. Gardezi [email protected] Abstract: Cellular Communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send text messages etc. using our cell phones, and new services continue to be added. Therefore, it is important to provide users with a secure channel for communication. This survey paper will give a brief introduction to the various generations of cellular networks. For those not familiar with the cellular network architecture, a brief description of the new 3G cellular network architecture will be provided. Limitations of cellular networks, their security issues and the different types of attacks will be discussed. Then the steps taken in the new 3G networks to combat the different security threats will be provided. Also, the security features of the Wireless Application Protocol (WAP) used to access the Internet will be discussed. The paper will go over some new security mechanisms that have been proposed by researchers. Table Of Contents: 1. Introduction 2. Generations Of Cellular Networks 2.1. 2G and 2.5G 2.2. 3G 2.3. 3G - UMTS Architecture 3. Security Issues 3.1. Limitations Of Cellular Networks 3.2. Security Issues In Cellular Networks 3.3. Types Of Attacks 4. Security Mechanisms In 3G - UMTS 4.1. 3G Security Architecture 4.2. Wireless Application Protocol (WAP) 5. Future 5.1. Additional Security Mechanisms 5.2. A Look At Security In 4G Summary References List Of Acronyms 1. Introduction Cellular Communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send text messages etc. using our cell phones, and new services continue to be added. However, the wireless medium has certain limitations over the wired medium such as open access, limited bandwidth and systems complexity. These limitations make it difficult although possible to provide security features such as authentication, integrity and confidentiality. The current generation of 3G networks have a packet switched core which is connected to external networks such as the Internet making it vulnerable to new types of attacks such as denial of service, viruses, worms etc. that have been used against the Internet.
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon