خوش آمدید

جستجو

تبلیغات





3Gsecure

    Security for the Third Generation (3G) Mobile System Colin Blanchard Network Systems & Security Technologies BTexaCT. Access and use of service to avoid or reduce a legitimate charge. · Loss of confidentiality or integrity of a user’s or operator’s data · Denial of a specific user’s access to their service or denial of access by all users to a service However, user expectations for instant communication and ease of use, as well as terminals which are easily lost or stolen, present a number of unique challenges in the mobile environment. The original first generation analogue mobile employed a simple electronic serial number to confirm that the terminal should be allowed access to the service. It was not long before the protection afforded to this number was broken. Eventually, devices appeared that could read these electronic serial numbers from the air, and access an unsuspecting user’s account for a short time, before moving on to the next, in the hope that the small charges on each bill would not be noticed. So why was this not predicted at the time? Unfortunately, there always seems to be an assumption, with any new development in communications technology, that complexity alone will protect such services from abuse. Second generation systems such as GSM were designed from the beginning with security in mind. This has stood up to the kind of attacks that were prevalent on the analogue system at the time, thanks mainly to the ability to put responsibility for security in the hands of the Home Environment (HE) operator. The HE operator can control the use of the system by the provision of the Subscriber Identity Module (SIM) which contains a user identity and authentication key. This is specifically arranged so that this long life authentication key is not required by the Serving Network (SN) when roaming, exposed over the air or exposed across the interface between the SIM and the mobile. This keeps to the minimum the level of trust the HE operator needs to place in the User, Serving Network and manufacturer of the Mobile Equipment (ME). In 1996, when the 3rd Generation system known as UMTS was being developed in ETSI (European Telecommunications Standards Institute), the opportunity was taken to review the basis for security in existing mobile systems and to develop a new security architecture specifically to be used in UMTS. This early work was subsequently taken forward into the Third Generation Partnership Project (3GPP) and this will be the basis for the Release 99 deployment of 3G systems.


    این مطلب تا کنون 14 بار بازدید شده است.
    منبع
    برچسب ها : this ,that ,security ,mobile ,generation ,access ,serving network ,electronic serial ,third generation ,
    3Gsecure

تبلیغات


    محل نمایش تبلیغات شما

پربازدیدترین مطالب

آمار

تبلیغات

محل نمایش تبلیغات شما

تبلیغات

محل نمایش تبلیغات شما

آخرین کلمات جستجو شده