113 research outputs found
Study and Implementation of 3G Mobile Security
In the last decade there has been an exponential rise in use of mobile devices. 3G is the latest mobile technology that is currently in widespread use. The Universal Mobile Telecommunications System (UMTS) is the most popular third generation mobile communication systems, which reposes on the popularity of the ‘second generation’ GSM system by introducing high quality services while retaining its essential and robust security features. Wireless communication is less secure, and mobility entails higher security risks than stationary devices. Security is the foremost concern in today’s mobile communication systems. Latest security mechanisms are needed to protect the singular features introduced in 3G technology. The security framework for 3G mobile networks is considered, and the various protocols for protection of the network access interface are studied and analyzed
Mobile consultant: Combining total mobility with constant access
Minimizing the time required for a medical consultant to offer his/her expert opinion, can be viewed as a life-saving procedure. We have designed and tested an integrated system that will allow a medical consultant to freely move either within, or outside the hospital, while still maintaining constant contact with the patients via videoconferencing and high-resolution imaging. The above system is explained in this paper, along with its advantages and its potential limitations. Conclusively, we demonstrate that such a system further increases the mobility of the medical consultant, while improving the healthcare service
Mobile consultant: Combining total mobility with constant access
Minimizing the time required for a medical consultant to offer his/her expert opinion, can be viewed as a life-saving procedure. We have designed and tested an integrated system that will allow a medical consultant to freely move either within, or outside the hospital, while still maintaining constant contact with the patients via videoconferencing and high-resolution imaging. The above system is explained in this paper, along with its advantages and its potential limitations. Conclusively, we demonstrate that such a system further increases the mobility of the medical consultant, while improving the healthcare service
Comparison of the performance of 3G security algorithms in the NAS layer
Cryptographic functionality implementation approaches have evolved over time, first, for running security software on a general-purpose processor, second, employing a separate security co-processor ,and third, using built-in hardware acceleration for security that is a part of a multi-core CPU system. The aim of this study is to do performance tests in order to examine the boost provided by accelerating KASUMI cryptographic functions on a multi-core Cavium OCTEON processor over the same non-accelerating cryptographic algorithm implemented in software.
Analysis of the results shows that the KASUMI SW implementation is much slower than the KASUMI HW-based implementation and this difference increases gradually as the packet size is doubled. In detailed comparisons between the encryption and decryption functions, the result indicates that at a lower data rate, neither of the KASUMI implementations shows much difference between encryption or decryption processing, regardless of the increase in the number of data packets that are being processed.
When all the 16 cores of the OCTEAN processor are populated, as the number of core increases, the number of processing cycles decreases accordingly. Another observation was that when the number of cores in use exceeds 5 cores, it doesn’t make much difference to the number of decrease of processing cycles.
This work illustrates the potential that up to sixteen cnMIPS cores integrated into a single-chip OCTEON processor provides for HW- and SW-based KASUMI implementations.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format
Security Review and Study of DoS Attacks on LTE Mobile Network
The main objective of 3GPP long term evolution (LTE) is to provide a secure communication, high data rate and better communication for 4G users. LTE support all IP based data and voice with speed in order of hundreds of mega-bytes per second. Increase speed in accessing internet. Network to be attached by hackers using some attacks like spyware ,malware ,Denial-of-Service (DoS) and Distributed Denial-of-Service(DDoS) .This paper associated with security problem in LTE network and brief summary of DoS attack , DDoS attack and security vulnerabilities in LTE networks
Improving Air Interface User Privacy in Mobile Telephony
Although the security properties of 3G and 4G mobile networks have
significantly improved by comparison with 2G (GSM), significant shortcomings
remain with respect to user privacy. A number of possible modifications to 2G,
3G and 4G protocols have been proposed designed to provide greater user
privacy; however, they all require significant modifications to existing
deployed infrastructures, which are almost certainly impractical to achieve in
practice. In this article we propose an approach which does not require any
changes to the existing deployed network infrastructures or mobile devices, but
offers improved user identity protection over the air interface. The proposed
scheme makes use of multiple IMSIs for an individual USIM to offer a degree of
pseudonymity for a user. The only changes required are to the operation of the
authentication centre in the home network and to the USIM, and the scheme could
be deployed immediately since it is completely transparent to the existing
mobile telephony infrastructure. We present two different approaches to the use
and management of multiple IMSIs
- …