METHODS FOR ENSURING DATA SECURITY IN MOBILE STANDARDS

نویسندگان

چکیده

The analysis of mobile communication standards is carried out, the functional structure and interfaces interaction between structural elements cellular network are considered. To understand principle according to GSM standard, a block diagram switching center (MSC), base station equipment (BSS), control service (MCC), stations (MS) presented. main algorithms for ensuring confidentiality security subscribers' data, in different types standards, as well vulnerabilities information flows In particular, following dangerous attacks have been identified, which subscribers sensitive: sniffing; leakage personal data; geolocation spoofing; remote capture SIM-card, execution arbitrary code (RCE); denial (DoS). It established that necessary function identification subscribers, performed by IMSI, recorded SIM card subscriber HLR operator. protect against spoofing, authenticates before starting its service. case identification, operator protected from effects fraudulent access. addition, user must be eavesdropping. This achieved encrypting data transmitted over radio interface. Thus, authentication UMTS, network, out using encryption with common key "hack-response" protocol (the authenticating party sends random number authenticated party, encrypts it certain algorithm returns result back).

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ensuring Data Storage Security in Cloud Computing

Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, h...

متن کامل

Ensuring Data Security & Consistency in FTIMA - A Fault Tolerant Infrastructure for Mobile Agents

Transaction management is one of the most crucial requirements for enterprise application development which often require concurrent access to distributed data shared amongst multiple application / nodes. Transactions guarantee the consistency of data records when multiple users or processes perform concurrent operations. Existing Fault Tolerance Infrastructure for Mobile Agents (FTIMA) provide...

متن کامل

Ensuring Data Security and Consistency in FTIMA - A Fault Tolerant Infrastructure for Mobile Agents

Transaction management is one of the most crucial requirements for enterprise application development which often require concurrent access to distributed data shared amongst multiple application / nodes. Transactions guarantee the consistency of data records when multiple users or processes perform concurrent operations. Existing Fault Tolerance Infrastructure for Mobile Agents (FTIMA) provide...

متن کامل

Ensuring authenticity and security in mobile device payment schemes

Even though mobile technology is becoming increasingly prevalent in modern life, the population is still largely unwilling to use mobile payment systems [9]. Furthermore, the longstanding concerns over the legitimacy of users can be solved by having the remote server verify the user by using remote user authentication [10]. Thus it follows that it is worth exploring techniques for mobile device...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie ?rodowiska

سال: 2022

ISSN: ['2083-0157', '2391-6761']

DOI: https://doi.org/10.35784/iapgos.2877