cellular_security - Security In Wireless Cellular Networks

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Security In Wireless Cellular Networks file:///X:/www-docs/cse574-06/ftp/cellular_security/index.html 1 of 12 5/9/2006 7:54 PM Security In Wireless Cellular Networks Ali I. Gardezi [email protected] Abstract: Cellular Communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send text messages etc. using our cell phones, and new services continue to be added. Therefore, it is important to provide users with a secure channel for communication. This survey paper will give a brief introduction to the various generations of cellular networks. For those not familiar with the cellular network architecture, a brief description of the new 3G cellular network architecture will be provided. Limitations of cellular networks, their security issues and the different types of attacks will be discussed. Then the steps taken in the new 3G networks to combat the different security threats will be provided. Also, the security features of the Wireless Application Protocol (WAP) used to access the Internet will be discussed. The paper will go over some new security mechanisms that have been proposed by researchers. Table Of Contents: 1. Introduction 2. Generations Of Cellular Networks 2.1. 2G and 2.5G 2.2. 3G 2.3. 3G - UMTS Architecture 3. Security Issues 3.1. Limitations Of Cellular Networks 3.2. Security Issues In Cellular Networks 3.3. Types Of Attacks 4. Security Mechanisms In 3G - UMTS 4.1. 3G Security Architecture 4.2. Wireless Application Protocol (WAP) 5. Future 5.1. Additional Security Mechanisms 5.2. A Look At Security In 4G Summary References List Of Acronyms 1. Introduction Cellular Communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send text messages etc. using our cell phones, and new services continue to be added. However, the wireless medium has certain limitations over the wired medium such as open access, limited bandwidth and systems complexity. These limitations make it difficult although possible to provide security features such as authentication, integrity and confidentiality. The current generation of 3G networks have a packet switched core which is connected to external networks such as the Internet making it vulnerable to new types of attacks such as denial of service, viruses, worms etc. that have been used against the Internet.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security In Wireless Cellular Networks file:///X:/www-docs/cse574-06/ftp/cellular_security/index.html 2 of 12 5/9/2006 7:54 PM Back to Table Of Contents 2. Generations Of Cellular Networks Cellular Networks have been around since the 1980s and each year their subscribers increase at a very fast rate. First generation (1G) networks were the first cellular networks introduced in the 1980s. They were only capable of transmitting voice at speeds of about 9.6 kbps max. In the US the system was known Advanced Mobile Phone System (AMPS) and in
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/01/2010 for the course IT itphd taught by Professor Nitin during the Spring '10 term at Vlerick Leuven Gent Management School.

Page1 / 12

cellular_security - Security In Wireless Cellular Networks

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online