113 research outputs found

    Study and Implementation of 3G Mobile Security

    Get PDF
    In the last decade there has been an exponential rise in use of mobile devices. 3G is the latest mobile technology that is currently in widespread use. The Universal Mobile Telecommunications System (UMTS) is the most popular third generation mobile communication systems, which reposes on the popularity of the ‘second generation’ GSM system by introducing high quality services while retaining its essential and robust security features. Wireless communication is less secure, and mobility entails higher security risks than stationary devices. Security is the foremost concern in today’s mobile communication systems. Latest security mechanisms are needed to protect the singular features introduced in 3G technology. The security framework for 3G mobile networks is considered, and the various protocols for protection of the network access interface are studied and analyzed

    Mobile consultant: Combining total mobility with constant access

    Get PDF
    Minimizing the time required for a medical consultant to offer his/her expert opinion, can be viewed as a life-saving procedure. We have designed and tested an integrated system that will allow a medical consultant to freely move either within, or outside the hospital, while still maintaining constant contact with the patients via videoconferencing and high-resolution imaging. The above system is explained in this paper, along with its advantages and its potential limitations. Conclusively, we demonstrate that such a system further increases the mobility of the medical consultant, while improving the healthcare service

    Mobile consultant: Combining total mobility with constant access

    Get PDF
    Minimizing the time required for a medical consultant to offer his/her expert opinion, can be viewed as a life-saving procedure. We have designed and tested an integrated system that will allow a medical consultant to freely move either within, or outside the hospital, while still maintaining constant contact with the patients via videoconferencing and high-resolution imaging. The above system is explained in this paper, along with its advantages and its potential limitations. Conclusively, we demonstrate that such a system further increases the mobility of the medical consultant, while improving the healthcare service

    Comparison of the performance of 3G security algorithms in the NAS layer

    Get PDF
    Cryptographic functionality implementation approaches have evolved over time, first, for running security software on a general-purpose processor, second, employing a separate security co-processor ,and third, using built-in hardware acceleration for security that is a part of a multi-core CPU system. The aim of this study is to do performance tests in order to examine the boost provided by accelerating KASUMI cryptographic functions on a multi-core Cavium OCTEON processor over the same non-accelerating cryptographic algorithm implemented in software. Analysis of the results shows that the KASUMI SW implementation is much slower than the KASUMI HW-based implementation and this difference increases gradually as the packet size is doubled. In detailed comparisons between the encryption and decryption functions, the result indicates that at a lower data rate, neither of the KASUMI implementations shows much difference between encryption or decryption processing, regardless of the increase in the number of data packets that are being processed. When all the 16 cores of the OCTEAN processor are populated, as the number of core increases, the number of processing cycles decreases accordingly. Another observation was that when the number of cores in use exceeds 5 cores, it doesn’t make much difference to the number of decrease of processing cycles. This work illustrates the potential that up to sixteen cnMIPS cores integrated into a single-chip OCTEON processor provides for HW- and SW-based KASUMI implementations.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Security Review and Study of DoS Attacks on LTE Mobile Network

    Get PDF
    The main objective of 3GPP long term evolution (LTE) is to provide a secure communication, high data rate and better communication for 4G users. LTE support all IP based data and voice with speed in order of hundreds of mega-bytes per second. Increase speed in accessing internet. Network to be attached by hackers using some attacks like spyware ,malware ,Denial-of-Service (DoS) and Distributed Denial-of-Service(DDoS) .This paper associated with security problem in LTE network and brief summary of DoS attack , DDoS attack and security vulnerabilities in LTE networks

    Improving Air Interface User Privacy in Mobile Telephony

    Full text link
    Although the security properties of 3G and 4G mobile networks have significantly improved by comparison with 2G (GSM), significant shortcomings remain with respect to user privacy. A number of possible modifications to 2G, 3G and 4G protocols have been proposed designed to provide greater user privacy; however, they all require significant modifications to existing deployed infrastructures, which are almost certainly impractical to achieve in practice. In this article we propose an approach which does not require any changes to the existing deployed network infrastructures or mobile devices, but offers improved user identity protection over the air interface. The proposed scheme makes use of multiple IMSIs for an individual USIM to offer a degree of pseudonymity for a user. The only changes required are to the operation of the authentication centre in the home network and to the USIM, and the scheme could be deployed immediately since it is completely transparent to the existing mobile telephony infrastructure. We present two different approaches to the use and management of multiple IMSIs
    corecore