3 research outputs found

    Software integrity management system.

    Get PDF
    The purpose of this thesis is to design, implement, and evaluate a software package that is mutli-platform and will provide software integrity management (SIM). The software package is implemented in Java and will perform two hashing algorithms, Message Digest version 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1), in order to verify the integrity of executable files. These records of executables and their hash value will be stored in flat database files. The database files will be stored off site on multiple servers. Each server will hold a file corresponding to the hash algorithm that was used. By storing the files off site, the users of the SIM package will be guaranteed a certain level of security and assurance that their executable files have not been tampered with. With the growing threats of security exploits and viruses, it is important for average users to be able to have this level of security. The security of the files off site will be as good as the security of the servers themselves. For this reason the server machines will be Linux machines since they are less susceptible to viruses. The server administrator will still have to keep up with security patches in order to avoid exploits, but the job will be less time consuming without having to worry about virus definitions. Initial testing using the GNU Compiler for Java (GCJ) in the Linux environment showed an increase in computational speed

    SECURITY MEASUREMENT FOR LTE/SAE NETWORK DURING SINGLE RADIO VOICE CALL CONTINUITY (SRVCC).

    Get PDF
    Voice has significant place in mobile communication networks. Though data applications have extensively gained in importance over the years but voice is still a major source of revenue for mobile operators. It is obvious that voice will remain an important application even in the era of Long Term Evolution (LTE). Basically LTE is an all-IP data-only transport technology using packet switching. Therefore, it introduces challenges to satisfy quality of service expectations for circuit-switched mobile telephony and SMS for LTE capable smartphones, while being served on the LTE network. Since 2013, mobile operators have been busy deploying Voice Over LTE (VoLTE). They are relying on a VoLTE technology called Single Radio Voice Call Continuity (SRVCC) for seamless handover between packet-switch domain to circuit-switch domain or vice versa. The aim of thesis is to review and identify the security measurement during SRVCC and verify test data for ciphering and integrity algorithm.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    SECURITY MEASUREMENT FOR LTE/SAE NETWORK DURING SINGLE RADIO VOICE CALL CONTINUITY (SRVCC).

    Get PDF
    Voice has significant place in mobile communication networks. Though data applications have extensively gained in importance over the years but voice is still a major source of revenue for mobile operators. It is obvious that voice will remain an important application even in the era of Long Term Evolution (LTE). Basically LTE is an all-IP data-only transport technology using packet switching. Therefore, it introduces challenges to satisfy quality of service expectations for circuit-switched mobile telephony and SMS for LTE capable smartphones, while being served on the LTE network. Since 2013, mobile operators have been busy deploying Voice Over LTE (VoLTE). They are relying on a VoLTE technology called Single Radio Voice Call Continuity (SRVCC) for seamless handover between packet-switch domain to circuit-switch domain or vice versa. The aim of thesis is to review and identify the security measurement during SRVCC and verify test data for ciphering and integrity algorithm.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format
    corecore