A Pattern Language for Mobility Management [1] Petri Jokela

Size: px
Start display at page:

Download "A Pattern Language for Mobility Management [1] Petri Jokela"

Transcription

1 A Pattern Language for Mobility Management [1] Petri Jokela

2 2G systems (GSM, D-AMPS) D Visited network Home network HLR VLR VLR HLR AuC AuC

3 A Pattern Language for Mobility Management!Wireless and mobile user s problems user s location security over wireless link!patterns divided into two categories architectural elements functions!motivation for this pattern language shows interactions between entities generating different scenarios related to mobile systems

4 Patterns for Mobility Management Architectural elements Functional behaviors Home and Visitor Databases Temporary identification Paging Authentication Security Database Ciphering Location registration

5 Home and Visitor databases Visited network Home network HLR VLR VLR HLR AuC AuC

6 Home and Visitor databases!context mobile users => changing location!problem how to enable user mobility?!forces mobile user s identification has no location information operators must maintain information about!own customers!currently visiting customers essential information: home, current and previous location services obtained from the current visited location area

7 Home and Visitor databases!solution two types of repositories: home and visited location updated with the location registration!resulting Context location registration updates the current location home and visitor databases provide information for security database for authentication and ciphering calculations

8 Security database Visited network Home network HLR VLR VLR HLR AuC AuC

9 Security database!context sensitive information handled in security functions location management functions handle authentication!problem how to securely handle user s sensitive information?!forces security mechanisms rely on secresy of their keys and algorithms home and visited database information vulnerable to attacks and failures secure information cannot be stored in the visitor database only (there is only temporary information)

10 Security database!solution create a database for secure information!can be accessed only by functions involved in security management process!does not transmit any sensitive information: performs the ciphering and the authentication calculations itself!home and visitor databases contain complementary information!resulting context ciphering and authentication functions use secure information stored in the security database to guarantee privacy and security to the mobile user

11 Temporary identification Visited network Home network 1. TI inquiry OR 2. TI assignment VLR VLR HLR AuC

12 Temporary identification! Context protection of user communication over the air interface!power on the MS!Travelling to a new location!incoming call to a mobile user! Problem how to protect user s identity when it is sent over the air interface?! Forces all information sent over radio interface can be listened by others many MSs using simultaneously a control channel: not protected user moving to a dedicated channel: short time when user s real identity is unknown

13 Temporary identification!solution assign a temporary identification to the MS dynamically allocated by the network: location area information + a digit string stored in the visitor database TI assignment: incoming call or changing location TI inquiry: power on or outgoing call!resulting context user identity is protected from eavesdroppers authentication and ciphering can be performed

14 Authentication Visited network Home network 1. requests auth 2. MS responses 3. verifies - VLR/HLR/AuC 4. Response to MS VLR VLR HLR AuC

15 Authentication! Context temporary identification has been requested by the MS ciphering protects traffic transmission could have been intercepted before TI and ciphering! Problem how to prevent unauthorized or fraudulent access to cellular netwoks?! Forces unprotected user information can be captured MS with false identity: bills to wrong persons passwords only good in protecting access to terminals robust authentication, no subscriber intervention, no exchange of keys and algorithms over the air interface

16 Authentication!Solution perform authentication using information in the MS and in the security database (keys and encryption algorithms) INPUT: random value from the network, secret key number, electronic serial number (MS id, in HLR), user s id number!resulting context protection agains unauthorized usage!secure environment provided for the user!related patterns authenticator [2] sender authentication, signature, secrecy with sender authentication, secrecy with signature [3]

17 Ciphering Visited network Home network 1. ciphering mode negotiation 2. ciphering data 3. deciphering data 3. VLR HLR AuC

18 Ciphering!Context idle mode: common channels dedicated channels after temporary identification!user information (voice, data), user-related signaling, system-related signaling!problem how to protect the privacy of the communication over an insecure channel?!forces clear text sending can be eavesdropped digital systems provide encryption when same data is encrypted, they must be different

19 Ciphering!Solution phone in dedicated mode: apply encryption ciphering key calculated from a random number, a computatino algorithm and a secret key MS and all databases responsible for storing inputs and calculating operations!resulting context enhanced privacy is provided in addition, authentication should be performed!related patterns secure-channel communication [3] information secrecy [3]

20 Paging Visited network Home network 1. paging request 2. paging response VLR HLR 2. AuC 1.

21 Paging!Context MS in a visited location, current location maintained in home and visited database!problem how to reach the MS and route the call to it?!forces the precise location of the MS must be known the dialed number does not have location information home and visited databases have information about the current location area the smaller cells, the more information transmitted

22 Paging!Solution send paging request to cells under the current location area MS responses: the exact location is now known!resulting context authentication and ciphering can follow paging provides a balance between the amount of location information to be exchanged and the number of needed paging messages

23 Location Registration Visited network Home network 1. VLR registration 2. HLR registration VLR 2. VLR HLR 1. AuC

24 Location Registration!Context user changes location authentication has been successfully performed!problem how to keep up-to-date information about the current location area of the MS?!Forces visitor database has a limited capacity accuracy of the location information is necessary the location information in the previous visitor database is no longer up-to-date, when user moves

25 Location Registration!Solution location registration to both the home database and current visited database!resulting context current location area is stored in the new visitor database old information is deleted from the previous visitor database the user can make and receive calls!related patterns parameter database [4]

26 Future work!hybrid networks (cellular, IP)

27 References![1] Andrade, R., Logrippo, L., Bottomley, M., Coram, T., A Pattern Language for Mobility Management In: Proceedings of Pattern Language of Programs (PLoP 2000), August 13-16, 2000.![2] Brown, F. L. Jr., DiVietri, J., Villegas, G. D., Fernandez, E. D., The Authenticator Pattern In: Proceedings of Pattern Language of Programs (PLoP 99), August 15-18, 1999.![3]Braga,A.M.,Rubira,C.M.F.,Dahab,R., Tropyc: A Pattern Language for Cryptographic Software, PLoPD4, N.D. Harrison, B. Foote, and H. Rohnert, eds., Addison-Wesley, , 2000.

28 References![4] Utas, G., A Pattern Language of Feature Interaction In: Feature Interaction in Telecommunications and Software System V, IOS Press, 1998.

Cellular Communication

Cellular Communication Cellular Communication Cellular Communication Cellular communication is designed to provide communications between two moving units, or between one mobile unit and one stationary phone or land unit (PSTN).

More information

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,

More information

Pertemuan 7 GSM Network. DAHLAN ABDULLAH

Pertemuan 7 GSM Network. DAHLAN ABDULLAH Pertemuan 7 GSM Network DAHLAN ABDULLAH Email : dahlan.unimal@gmail.com Contents GSM-Introduction Architecture Technical Specification & Operation Frame Structure Channels Call Routing Security Characteristics

More information

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up.

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10 Call Set-up Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10.1 INTRODUCTION... 2 10.2 CALL TO MS (MT)... 3 10.3 CALL FROM MS

More information

Mobility and Security Management in the GSM System

Mobility and Security Management in the GSM System IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 ISBN: 2878-8719 PP 13-18 National Symposium on engineering and Research Mobility and Security Management in the GSM System 1 Mr. Yogesh S. Amle 2 Mr.

More information

Security issues in mobile communications

Security issues in mobile communications University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 1994 Security issues in mobile communications Chenthurvasan Duraiappan

More information

Basics of GSM in depth

Basics of GSM in depth This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets

More information

Chapter 3 GSM and Similar Architectures

Chapter 3 GSM and Similar Architectures CSF645 Mobile Computing 行動計算 Chapter 3 GSM and Similar Architectures 吳俊興 國立高雄大學資訊工程學系 Chapter 3 GSM and Similar Architectures 3.1 GSM Services and System Architecture 3.2 Radio Interfaces 3.3 Protocols

More information

Efficient GSM Authentication and Key Agreement Protocols with Robust User Privacy Protection

Efficient GSM Authentication and Key Agreement Protocols with Robust User Privacy Protection Efficient GSM Authentication and Key Agreement Protocols with Robust User Privacy Protection Author: Jing-Lin Wu, Wen-Shenq Juang and Sian-Teng Chen Department of Information Management, Shih Hsin University,

More information

Practical Operator Considerations Cellular Analog Cellular Rogue Base Station Tumbling Cloning

Practical Operator Considerations Cellular Analog Cellular Rogue Base Station Tumbling Cloning Practical Operator Considerations Cellular Analog Cellular Rogue Base Station Tumbling Cloning Getting paid Prevent (limit) subscriber fraud Ensure accurate clearing with other operators Reduce churn Ensure

More information

GSM System Overview. Ph.D. Phone Lin.

GSM System Overview. Ph.D. Phone Lin. GSM System Overview Phone Lin Ph.D. Email: plin@csie.ntu.edu.tw 1 Outlines Introduction GSM Architecture Location Tracking and Call Setup Security GSM Data Services Unstructured Supplementary Service Data

More information

Chapter 13 Location Privacy

Chapter 13 Location Privacy Chapter 13 Location Privacy Security aspects of mobile communication Implicit addressing Pseudonyms Communication mixes [NetSec], WS 2007/2008 13.1 Security Aspects of Mobile Communication Mobile communication

More information

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication

More information

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase UNIT-5 GSM System Operations (Traffic Cases) Registration, call setup, and location updating Call setup Interrogation phase For the interrogation phase The initial address message comes outside the GSM

More information

EUROPEAN ETS TELECOMMUNICATION November 1996 STANDARD

EUROPEAN ETS TELECOMMUNICATION November 1996 STANDARD EUROPEAN ETS 300 522 TELECOMMUNICATION November 1996 STANDARD Third Edition Source: ETSI TC-SMG Reference: RE/SMG-030302PR2 ICS: 33.020 Key words: Digital cellular telecommunications system, Global System

More information

Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm.

Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm. Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm. Garba S. (1), Abdu-Aguye U.-F., Raubilu A.A., Ibrahim Y. Department of Electrical and Computer Engineering,

More information

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security 1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of

More information

Security Management System of Cellular Communication: Case Study

Security Management System of Cellular Communication: Case Study Security Management System of Cellular Communication: Case Study Othman O. Khalifa, Abdulrazzag Aburas, A. Al Bagul, Meftah Hrairi, Muhammad Shahril bin Shahbuddin, and Harman bin Mat Kasa Abstract Cellular

More information

CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION

CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION The most important part of any project i.e., implementation. It describes the various functionalities step by step under each module with their outputs.

More information

E2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: )

E2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: ) E2-E3: CONSUMER MOBILITY CHAPTER-5 CDMA 2000 1x OVERVIEW (Date of Creation: 01-04.2011) Page: 1 CDMA 2000 1X Overview Introduction CDMA (code division multiple access) is a mobile digital radio technology

More information

Security of Cellular Networks: Man-in-the Middle Attacks

Security of Cellular Networks: Man-in-the Middle Attacks Security of Cellular Networks: Man-in-the Middle Attacks Mario Čagalj University of Split 2013/2014. Security in the GSM system by Jeremy Quirke, 2004 Introduction Nowadays, mobile phones are used by 80-90%

More information

GPRS security. Helsinki University of Technology S Security of Communication Protocols

GPRS security. Helsinki University of Technology S Security of Communication Protocols GPRS security Helsinki University of Technology S-38.153 Security of Communication Protocols vrantala@cc.hut.fi 15.4.2003 Structure of the GPRS Network BSS GTP PLMN BSS-Base Station sub-system VLR - Visiting

More information

Security functions in mobile communication systems

Security functions in mobile communication systems Security functions in mobile communication systems Dr. Hannes Federrath University of Technology Dresden Security demands Security functions of GSM Known attacks on GSM Security functions of UMTS Concepts

More information

Contents. GSM and UMTS Security. Cellular Radio Network Architecture. Introduction to Mobile Telecommunications

Contents. GSM and UMTS Security. Cellular Radio Network Architecture. Introduction to Mobile Telecommunications Royal Holloway, University of London, IC3 Network Security, 13 November 2006 Contents GSM and UMTS Security Introduction to mobile telecommunications Second generation systems - GSM security Third generation

More information

Mobility: vocabulary

Mobility: vocabulary What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,

More information

Mobility Management usually includes two parts: location management and handoff management.

Mobility Management usually includes two parts: location management and handoff management. Mobile Data / Mobility Management I. Mobile Data Services/ Management This broad area involves a lot of industrial applications. Mobile data services/ management is becoming another profitable market for

More information

GSM Mobility Management

GSM Mobility Management GSM Mobility Management Phone Lin Ph.D. Email: plin@csie.ntu.edu.tw 1 Outlines Introduction GSM Location Update Basic Call Origination and Termination Procedures Mobility Databases Failure Restoration

More information

GSM Open-source intelligence

GSM Open-source intelligence GSM Open-source intelligence Kenneth van Rijsbergen 1 1 MSc System and Network Engineering Faculty of Science University of Amsterdam 30 June 2016 Kenneth van Rijsbergen University of Amsterdam GSM OSINT

More information

Semi-Active GSM Monitoring System SCL-5020SE

Semi-Active GSM Monitoring System SCL-5020SE Semi-Active GSM Monitoring System SCL-5020SE Technology Introduction: GSM networks are most popular and widespread wireless communication media across the world, having a wide customer base in Europe and

More information

28 Deploying IN Services in a Mobile Environment

28 Deploying IN Services in a Mobile Environment 28 Deploying IN Services in a Mobile Environment D. Haran Comverse Network Systems 170 Crossways Park Drive, Woodbury, New York 11797 USA Tel: (516) 677-7200, Fax: (516) 677-7355 E-mail danny_haran@comverse.com

More information

EUROPEAN ETS TELECOMMUNICATION July 1998 STANDARD

EUROPEAN ETS TELECOMMUNICATION July 1998 STANDARD EUROPEAN ETS 300 929 TELECOMMUNICATION July 1998 STANDARD Third Edition Source: SMG Reference: RE/SMG-030320QR1 ICS: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile

More information

No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after.

No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Administrivia No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after. 1 CSMA/CA: Recap Sensing in wireless medium is limited

More information

City Research Online. Permanent City Research Online URL:

City Research Online. Permanent City Research Online URL: Komninos, N. & Dimitriou, T. (2006). Adaptive authentication and key agreement mechanism for future cellular systems. Paper presented at the 15th IST Mobile & Wireless Communications Summit, 04-08 June

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #4 Telecom System Security General Vulnerabilities Service interruption vulnerabilities Due to increased capacity offered by high speed communication

More information

Designing Authentication for Wireless Communication Security Protocol

Designing Authentication for Wireless Communication Security Protocol Designing Authentication for Wireless Communication Security Protocol Ms. Roshni Chandrawanshi, Prof. Ravi Mohan, Mr. Shiv Prakash Chandrawanshi Abstract Security is considered an important issue for mobile

More information

CSC 4900 Computer Networks: Mobility

CSC 4900 Computer Networks: Mobility CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping

More information

G 364: Mobile and Wireless Networking. CLASS 19, Mon. Mar Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

G 364: Mobile and Wireless Networking. CLASS 19, Mon. Mar Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob G 364: Mobile and Wireless Networking CLASS 19, Mon. Mar. 22 2004 Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob Mobility Management Crucial problem in PCS Affect the performance of the system

More information

LESSON 12: WI FI NETWORKS SECURITY

LESSON 12: WI FI NETWORKS SECURITY LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information

More information

Circuit switched network

Circuit switched network GPRS-Services Page 12 2. GPRS-Services GPRS integrates a vast sum of additional services in a GSM-network. For this it will be necessary to define a subscriber profile that corresponds with services the

More information

Wireless and Mobile Network Architecture

Wireless and Mobile Network Architecture Wireless and Mobile Network Architecture Chapter 2: Mobility Management Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Sep. 2006 1 Outline Introduction

More information

GSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS

GSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS GSM Example of a PLMN (Public Land Mobile Network) At present most successful cellular mobile system (over 200 million subscribers worldwide) Digital (2 nd Generation) cellular mobile system operating

More information

Information Technology Mobile Computing Module: GSM Handovers

Information Technology Mobile Computing Module: GSM Handovers Information Technology Mobile Computing Module: GSM Handovers Learning Objectives Recap of previous modules Basic functions of Network Sub System Entities that form NSS namely MSC,GMSC,HLR and VLR Functions

More information

Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking

Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Last time Router internals Input ports, switching fabric, output ports Switching via memory, bus, crossbar Queueing, head-of-line blocking Mobility Home, visited s Home, foreign agents Permanent, care-of

More information

Cellular Networks and Mobility

Cellular Networks and Mobility Cellular Networks and Mobility Daniel Zappala CS 460 Computer Networking Brigham Young University Cellular Networks GSM 2G/3G Architecture 3/20 2G Standard 4/20 GSM: combined FDM/TDM divide into 200 khz

More information

Wireless and Mobile Network Architecture

Wireless and Mobile Network Architecture Wireless and Mobile Network Architecture Chapter 8: GSM Mobility Management Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Nov. 2006 1 Outline

More information

Wireless Security Security problems in Wireless Networks

Wireless Security Security problems in Wireless Networks Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security

More information

Next, we compare procedures for certain feature scenarios. In the IS-41 approach, features are handled in three ways: by the HLR upon receiving a

Next, we compare procedures for certain feature scenarios. In the IS-41 approach, features are handled in three ways: by the HLR upon receiving a Next, we compare procedures for certain feature scenarios In the IS-41 approach, features are handled in three ways: by the HLR upon receiving a LOCREQ, a serving upon receiving a ROUTEREQ, or by the serving

More information

Communication Networks 2 Signaling 2 (Mobile)

Communication Networks 2 Signaling 2 (Mobile) Communication Networks 2 Signaling 2 (Mobile) Gusztáv Adamis BME TMIT 2017 GSM signaling Signaling of GSM is based on the ISDN signaling systems SS7/DSS1 But, because of mobility, roaming, radio access

More information

5. Functions and Procedures within GPRS

5. Functions and Procedures within GPRS GPRS Functions Page 41 5. Functions and Procedures within GPRS Within GPRS-Networks a large row of Functions and procedures have to be realised to enable the transport of packet switched data. These Functions

More information

Define information security Define security as process, not point product.

Define information security Define security as process, not point product. CSA 223 Network and Web Security Chapter One What is information security. Look at: Define information security Define security as process, not point product. Define information security Information is

More information

Understanding TETRA Security

Understanding TETRA Security Understanding TETRA Security Brian Murgatroyd Tetra Association former chairman Security and Fraud Prevention Group (SFPG) Warren Systems Independent Security Consultant brian@warrensystems.co.uk Agenda

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #3 Telecom Security from 1G to 4G Basics of Telecom Security Different players in the mobile ecosystem have different security concerns Security concerns

More information

Data and Voice Signal Intelligence Interception Over The GSM Um Interface

Data and Voice Signal Intelligence Interception Over The GSM Um Interface ISSN (Online): 2394-3858 ISSN (Print): 2394-3866 International Journal of Research and Innovations in Science & Technology, SAINTGITS College of Engineering, INDIA www.journals.saintgits.org Research paper

More information

Linux Network Administration

Linux Network Administration Secure Remote Connections with OpenSSH Objective At the conclusion of this module, the student will be able to: Configure the ssh daemon start, stop, and restart sshd 17 January 2005 NETW 111 - SSH 2 SSH

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN 7 Location Management Strategies in Mobile Networks Vivek Kumar Department of Computer Science & Engineering Graphic Era University, Dehradun, INDIA vivekror7@gmail.com Narayan Chaturvedi Department of

More information

3G TS V3.1.0 ( )

3G TS V3.1.0 ( ) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; Organization of subscriber data () The present document has been developed within the 3 rd Generation

More information

NS-AKA: An Improved and Efficient AKA Protocol for 3G (UMTS) Networks

NS-AKA: An Improved and Efficient AKA Protocol for 3G (UMTS) Networks NS-AKA: An Improved and Efficient AKA Protocol for 3G (UMTS) Networks Neetesh Saxena, Narendra S. Chaudhari Abstract- In this paper, we propose an improved and efficient AKA protocol named NS-AKA to prevent

More information

GSM System Protocol Architecture

GSM System Protocol Architecture GSM System Protocol Architecture References: Jörg Erbespächer, Hans Jörg Vogel, Christian Bettstetter, GSM: Switching services and protocols, Wiley 2001, ISBN 0-471-499903-X Schiller: Mobile communications,

More information

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Distributed Systems. Lecture 14: Security. Distributed Systems 1 06-06798 Distributed Systems Lecture 14: Security Distributed Systems 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

BS801E-BSCS. Cryptography

BS801E-BSCS. Cryptography Jay-Ar Baliguat BS801E-BSCS Ms.Myrlen Maria Antoni Cryptography Cryptography can be defined as the conversion of data into a scrambled code that can be deciphered and sent across a public or private network.

More information

Distributed Systems. Lecture 14: Security. 5 March,

Distributed Systems. Lecture 14: Security. 5 March, 06-06798 Distributed Systems Lecture 14: Security 5 March, 2002 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

Threat patterns in GSM system. Basic threat patterns:

Threat patterns in GSM system. Basic threat patterns: Threat patterns in GSM system Usage of mobile devices in business simpli es, speeds up and optimizes business processes. However, it is necessary to understand that the more complicated the device is the

More information

authentication will be required between roaming user, visited network and home network.

authentication will be required between roaming user, visited network and home network. Classification of Security Authentication for Roaming User in Mobile Networks Ja afer AL-Saraireh & Sufian Yousef j.al-saraireh@anglia.ac.uk, s.yousef@anglia.ac.uk Anglia Ruskin University Chelmsford UK

More information

A Review on Security in Mobile Communication Technology

A Review on Security in Mobile Communication Technology A Review on Security in Mobile Communication Technology Shaik Aleem Ur Rehaman 1, Tanveer Baig Z 2, Prithvi G Hardikar 3, Mr.Saqib Rashid 4,Mr.Zahid Nazir Moon 5 Yassar arfath khan 6 UG Students, Dept.

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Logistics Instructor Office: EV007-647, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Tuesday: 3 pm 5 pm Time: Usually: Tuesday, 17h45-20h15

More information

11:1 Anonymous Internet Access Method for Wireless Systems

11:1 Anonymous Internet Access Method for Wireless Systems 11:1 Anonymous Internet Access Method for Wireless Systems Petri Jokela Juha-Petri Kärnä NomadicLab, Ericsson Research FIN-02420 Jorvas Finland {petri.jokela, juha-petri.karna}@ericsson.com 1 Introduction

More information

E3-E4 (CM MODULE) CDMA x & EV-DO. For internal circulation of BSNL only

E3-E4 (CM MODULE) CDMA x & EV-DO. For internal circulation of BSNL only E3-E4 (CM MODULE) CDMA 2000 1x & EV-DO WELCOME This is a presentation for the E3-E4 Technical (CM- Module)fortheTopic:CDMA20001x&EV-DO Eligibility: Those who have got the upgradation frome3toe4. This presentation

More information

Understanding Carrier Wireless Systems

Understanding Carrier Wireless Systems Understanding Course Description This course provides a detailed scope of modern mobile and cellular network technologies used for second generation, 2G+, 3G and 4G networks. It provides an understanding

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Logistics Instructor Office: EV006-227, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Friday: 3 pm 5 pm Time: Friday, 17h45-20h15 Room

More information

Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Presented by Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering

More information

Network Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013

Network Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013 Network Security: Cellular Security Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2013 Outline Cellular networks GSM security architecture and protocols Counters UMTS AKA and session

More information

Security Philosophy. Humans have difficulty understanding risk

Security Philosophy. Humans have difficulty understanding risk Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy

More information

Secure 3G user authentication in ad-hoc serving networks

Secure 3G user authentication in ad-hoc serving networks Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2005 Secure 3G user authentication in ad-hoc serving networks Lyn L. Evans Louisiana State University and Agricultural

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

WIRELESS SYSTEM AND NETWORKING

WIRELESS SYSTEM AND NETWORKING LECTURE 6 WIRELESS SYSTEM AND NETWORKING References: Rappaport (Chapter 9 and 10) Bernhard (Chapter 3, 4 and 5) Garg (Chapter 8 and 9) Kaarenen (Chapter 1-5 and 9) WIRELESS EVOLUTION Japan Europe Americas

More information

ONE TIME SECRET KEY MECHANISM FOR MOBILE COMMUNICATION

ONE TIME SECRET KEY MECHANISM FOR MOBILE COMMUNICATION ONE TIME SECRET KEY MECHANISM FOR MOBILE COMMUNICATION Vasu.R 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur vasu.shriram2@gmail.com 2 Professor

More information

Service Managed Gateway TM. Configuring IPSec VPN

Service Managed Gateway TM. Configuring IPSec VPN Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling

More information

Mobile Communications

Mobile Communications Mobile Communications 3GPP Public Land Mobile Networks: GSM, GPRS Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 What is the architecture of the GSM network network elements, interfaces,

More information

UMTS System Architecture and Protocol Architecture

UMTS System Architecture and Protocol Architecture UMTS System Architecture and Protocol Architecture Overview on overall system architecture UMTS network architecture and elements Mobile station High-level functions UMTS domains and strata UMTS/GPRS protocol

More information

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism Module 9 - Security Issues Separation of Security policies Precise definition of which entities in the system can take what actions Security mechanism Means of enforcing that policy Distributed system

More information

THREATS TO PACKET CORE SECURITY OF 4G NETWORK

THREATS TO PACKET CORE SECURITY OF 4G NETWORK 07 CONTENTS Terms and abbreviations... : main components and protocols...4 Attack scenarios...5 What is necessary for a successful attack...5 Threats to EPC security...7. Fraud...7. Connection hijacking...8.

More information

Network Security Issues and Cryptography

Network Security Issues and Cryptography Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi

More information

ETSI TS V6.4.0 ( )

ETSI TS V6.4.0 ( ) TS 100 526 V6.4.0 (2000-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Organization of subscriber data (GSM 03.08 version 6.4.0 Release 1997) GLOBAL SYSTEM FOR MOBILE

More information

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology Cellular Systems - II Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication UMTS Architecture A UMTS network consist

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Signaling System 7 (SS7) By : Ali Mustafa

Signaling System 7 (SS7) By : Ali Mustafa Signaling System 7 (SS7) By : Ali Mustafa Contents Types of Signaling SS7 Signaling SS7 Protocol Architecture SS7 Network Architecture Basic Call Setup SS7 Applications SS7/IP Inter-working VoIP Network

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Personal Handyphone Systems in Urban Infrastructure

Personal Handyphone Systems in Urban Infrastructure Personal Handyphone Systems in Urban Infrastructure Yukio Iino Mitsunobu Ootsuka Isao Shimbo ABSTRACT: The personal handyphone system (PHS) service began in Japan in 1995. As this new communication service

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

Mobility Management. Shun-Ren Yang Ph.D.

Mobility Management. Shun-Ren Yang Ph.D. Mobility Management Shun-Ren Yang Ph.D. Email: sryang@cs.nthu.edu.tw 1 Outlines Introduction Handoff Roaming Management 2 A Common PCS Network Architecture VL R MSC PSTN HLR VLR MSC BS HLR: Home Location

More information

INSTITUTO DE MATEMÁTICA E ESTATÍSTICA UNIVERSIDADE DE SÃO PAULO. GSM Security. MAC Computação Móvel

INSTITUTO DE MATEMÁTICA E ESTATÍSTICA UNIVERSIDADE DE SÃO PAULO. GSM Security. MAC Computação Móvel INSTITUTO DE MATEMÁTICA E ESTATÍSTICA UNIVERSIDADE DE SÃO PAULO GSM Security MAC 5743 - Computação Móvel Damian Matuszewski NR USP 7956955 dimatusz@gmail.com 12/07/2012 Abstract: GSM is the most common

More information

Securing Wireless LANs with Certificate Services

Securing Wireless LANs with Certificate Services 1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 3 User Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown User Authentication fundamental security building

More information

GSM security country report: Thailand

GSM security country report: Thailand GSM security country report: Thailand GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin February 2013 Abstract. GSM networks differ widely in their protection capabilities against common

More information

Abstract. Keywords: Mobile Network, Wireless Security, Authentication, Authorization.

Abstract. Keywords: Mobile Network, Wireless Security, Authentication, Authorization. Mobile Assisted Bit Sequence Authentication and Authorization (MABSAA) Pankaj Aggarwal, Kartikeya Tripathi, Janise McNair, Haniph A. Latchman Department of Electrical and Computer Engineering, University

More information

But where'd that extra "s" come from, and what does it mean?

But where'd that extra s come from, and what does it mean? SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying

More information

3GPP TS V9.4.0 ( )

3GPP TS V9.4.0 ( ) TS 23.007 V9.4.0 (2010-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Restoration procedures (Release 9) The present document

More information

Secure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography.

Secure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography. Secure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography T K Mohanta 1, R K Samantaray 2, S Panda 3 1. Dept.of Electronics & Communication.Engg, Sudhananda Engg & Research

More information

CT30A8800 Secured communications

CT30A8800 Secured communications CT30A8800 Secured communications Pekka Jäppinen September 11, 2007 Pekka Jäppinen, Lappeenranta University of Technology: September 11, 2007 General Ti5318800 Secured Communications Lecturer: Pekka Jäppinen

More information