1,765 research outputs found

    Secure Data Transmission over Mobile Voice Channel

    Get PDF
    Tänapäeval on mobiilside üks levinumaid viise informatsioonivahetuseks peale silmitsi suhtlemise ja interneti. Kuigi mobiilside standardid tagavad kõnede turvalisust, on neis ka teadaolevaid turvaauke. Kindlates olukordades võib kurjategija mobiilikõnet pealt kuulata või pääseda juurde mobiilioperaatori poolt salvestatud kõnedele. Mõned turvalise mobiilikõne lahendused kasutavad andmeedastuseks internetti. Teised pakkuvad spetsiaalseid telefone, mis loovad omavahel turvalist häälekanalit. Esimene variant ei sobi inimestele, kellel pole ligipääsu mobiilsele internetile, teine variant on aga kallis ning seda ei saa kasutada teiste telefonidega. Selles töös me kirjeldame lahendust, mis tagab turvalisuse enne kui informatsioon jõuab telefonisse. Tundlikud andmed töödeldakse eraldiseisvas seadmes ning saadetakse telefonisse analoogse helisignaalina. Sellist seadet saab ühendada igal telefoniga, millel on ette nähtud heli sisend. Töö käigus me vaatlesime erinevaid olemasolevaid lahendusi, seadistasime süsteemi parameetreid ja viisime läbi katsed. Tulemusena me saavutasime süsteemi, mis edastab turvaliselt andmed kiirusega kuni 2000 biti sekundis ja veamäära mediaaniga 21 protsenti. Võtmesõnad: Andmeedastus, häälekanal, mobiilside, modulatsioon, krüpteerimine.Nowadays mobile communication is one of the most common forms of exchanging information. Although mobile communication standards were designed with security in mind, a few known vulnerabilities exist. An attacker can penetrate a mobile network and eavesdrop on a victim's conversation or access data servers of the operator where conversation recordings are stored. A number of attempts has been done to address the issue of mobile communication security. Software solutions use a mobile data channel with standard security mechanisms for information exchange. Hardware solutions represent custom phones that create secure voice channel between two such devices. The first solution does not suite users, who do not have access to the mobile data channel. The disadvantage of the second solution is a high cost and an incompatibility with general phones. In this work, we describe an alternative solution, where security is enforced before any information reaches the phone. Sensitive information such as voice is processed in an external device and then passed into the mobile phone as an analog sound signal. The advantage of this approach is that the external unit and can be attached to any phone with a sound input. While building the system, we analyzed a number of existing solutions, tuned parameters and performed experiments. As a result, we came up with a system that performs secure data transfer at a speed of up to 2000 bps and a median error rate of 21 percent. Keywords: Data transmission, voice channel, mobile communication, modulation, encryption

    SECURITY AND PRIVACY ISSUES IN MOBILE NETWORKS, DIFFICULTIES AND SOLUTIONS

    Get PDF
    Mobile communication is playing a vital role in the daily life for the last two decades; in turn its fields gained the research attention, which led to the introduction of new technologies, services and applications. These new added facilities aimed to ease the connectivity and reachability; on the other hand, many security and privacy concerns were not taken into consideration. This opened the door for the malicious activities to threaten the deployed systems and caused vulnerabilities for users, translated in the loss of valuable data and major privacy invasions. Recently, many attempts have been carried out to handle these concerns, such as improving systems’ security and implementing different privacy enhancing mechanisms. This research addresses these problems and provides a mean to preserve privacy in particular. In this research, a detailed description and analysis of the current security and privacy situation in the deployed systems is given. As a result, the existing shortages within these systems are pointed out, to be mitigated in development. Finally a privacy preserving prototype model is proposed. This research has been conducted as an extensive literature review about the most relevant references and researches in the field, using the descriptive and evaluative research methodologies. The main security models, parameters, modules and protocols are presented, also a detailed description of privacy and its related arguments, dimensions and factors is given. The findings include that mobile networks’ security along with users are vulnerable due to the weaknesses of the key exchange procedures, the difficulties that face possession, repudiation, standardization, compatibility drawbacks and lack of configurability. It also includes the need to implement new mechanisms to protect security and preserve privacy, which include public key cryptography, HIP servers, IPSec, TLS, NAT and DTLS-SRTP. Last but not least, it shows that privacy is not absolute and it has many conflicts, also privacy requires sophisticated systems, which increase the load and cost of the system.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    SECURITY MEASUREMENT FOR LTE/SAE NETWORK DURING SINGLE RADIO VOICE CALL CONTINUITY (SRVCC).

    Get PDF
    Voice has significant place in mobile communication networks. Though data applications have extensively gained in importance over the years but voice is still a major source of revenue for mobile operators. It is obvious that voice will remain an important application even in the era of Long Term Evolution (LTE). Basically LTE is an all-IP data-only transport technology using packet switching. Therefore, it introduces challenges to satisfy quality of service expectations for circuit-switched mobile telephony and SMS for LTE capable smartphones, while being served on the LTE network. Since 2013, mobile operators have been busy deploying Voice Over LTE (VoLTE). They are relying on a VoLTE technology called Single Radio Voice Call Continuity (SRVCC) for seamless handover between packet-switch domain to circuit-switch domain or vice versa. The aim of thesis is to review and identify the security measurement during SRVCC and verify test data for ciphering and integrity algorithm.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    CPA\u27s guide to wireless technology and networking

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1303/thumbnail.jp

    Secure End-to-End Communications in Mobile Networks

    Get PDF
    2009 - 2010Cellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and text messages and new services continue to be added. The frequencies over which voice is transmitted are public, so voice encryption is necessary to avoid interception of the signal over the air. But once the signal reaches the operators Base Station (BS), it will be transmitted to the receiver over a wired or wireless mean. In either case, no protection is de ned. This does not seem a problem, but this is not true. Along the path across operator network, voice is at risk. It will only be encrypted again, with a di erent key, from the BS to the receiver if the receiver is herself a mobile user. Moreover, voice encryption is not mandatory. The choice whether or not to accept an unprotected communication is up to the network. When adopted, the same encryption algorithm is used for sending SMS messages between mobile telephones and base stations and for encrypting of calls. Unfortunately, vulnerabilities in this encryption systems were already revealed more than 10 years ago and more continue to be discovered. Currently the most popular communication technologies are the GSM and the UMTS. The UMTS is in use as a successor to GSM. Along with mobile phone services, It provides rapid data communication. The security algo- rithms in UMTS di ers from GSM in two important ways: encryption and mutual authentication. Although security standards have been improved, the end- to-end security is not provided... [edited by Author]IX n.s

    SECURITY MEASUREMENT FOR LTE/SAE NETWORK DURING SINGLE RADIO VOICE CALL CONTINUITY (SRVCC).

    Get PDF
    Voice has significant place in mobile communication networks. Though data applications have extensively gained in importance over the years but voice is still a major source of revenue for mobile operators. It is obvious that voice will remain an important application even in the era of Long Term Evolution (LTE). Basically LTE is an all-IP data-only transport technology using packet switching. Therefore, it introduces challenges to satisfy quality of service expectations for circuit-switched mobile telephony and SMS for LTE capable smartphones, while being served on the LTE network. Since 2013, mobile operators have been busy deploying Voice Over LTE (VoLTE). They are relying on a VoLTE technology called Single Radio Voice Call Continuity (SRVCC) for seamless handover between packet-switch domain to circuit-switch domain or vice versa. The aim of thesis is to review and identify the security measurement during SRVCC and verify test data for ciphering and integrity algorithm.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks

    Get PDF
    Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter. We describe the design of our VoIP Vulnerability Assessment Tool (VVAT) with which we demonstrate vulnerabilities to DoS attacks inherent in many of the popular VoIP applications available today. In our threat model we assume an adversary who is not a network administrator, nor has direct control of the channel and key VoIP elements. His aim is to degrade his victim's QoS without giving away his presence by making his attack look like a normal network degradation. Even black-boxed, applications like Skype that use proprietary protocols show poor performance under specially crafted DoS attacks to its media stream. Finally we show how securing Skype relays not only preserves many of its useful features such as seamless traversal of firewalls but also protects its users from DoS attacks such as recording of conversations and disruption of voice quality. We also present our experiences using virtualization to protect VoIP applications from 'insider attacks'. Our contribution is two fold we: 1) Outline a threat model for VoIP, incorporating our attack models in an open-source network simulator/emulator allowing VoIP vendors to check their software for vulnerabilities in a controlled environment before releasing it. 2) We present two promising approaches for protecting the confidentiality, availability and authentication of VoIP Services

    SeBoCom Pre-Study - A preliminary study on Secure Border Communications

    Get PDF
    This document contains the outcome of the SeBoCom pre-study. The main objective of the SeBoCom project was to define the way to proceed to a further and complete study. This task was to be achieved through this pre-study and through a Workshop involving end-users to stimulate the discussion and gain input regarding their needs. This pre-study collects some initial data on the present Communications infrastructures outlining the co-existence of many different systems, some already based on digital technology, others outdated or quite obsolete. One of the key finding of the present study is the need to define joint procedures to manage communications among different bodies belonging to different Member States: the most reliable and secure telecommunication infrastructure will be useless if there is no agreement on the type and structure of communications that are transmitted over the infrastructure. The pre-study initially considers the pivotal role played by communications in Border Protection field operations, analyzing the different operational aspects. It subsequently presents the state if the art of the communication infrastructures of Border Security Forces in Europe as well as the expected future scenarios obtained through questionnaires sent to the contact points in the Member States. An initial broad view of the requirements for Secure Border Communications is outlined; this is followed by an analysis of the lessons learned in previous events; then a survey of the previous/ongoing studies on similar topics is also presented. The last chapters provide a Technology Survey and the conclusions based on the outcome of the pre-study and of the Workshop held in Ispra on May 27th and 28th 2008.JRC.G.6-Sensors, radar technologies and cybersecurit
    corecore