METHODS FOR ENSURING DATA SECURITY IN MOBILE STANDARDS
نویسندگان
چکیده
The analysis of mobile communication standards is carried out, the functional structure and interfaces interaction between structural elements cellular network are considered. To understand principle according to GSM standard, a block diagram switching center (MSC), base station equipment (BSS), control service (MCC), stations (MS) presented. main algorithms for ensuring confidentiality security subscribers' data, in different types standards, as well vulnerabilities information flows In particular, following dangerous attacks have been identified, which subscribers sensitive: sniffing; leakage personal data; geolocation spoofing; remote capture SIM-card, execution arbitrary code (RCE); denial (DoS). It established that necessary function identification subscribers, performed by IMSI, recorded SIM card subscriber HLR operator. protect against spoofing, authenticates before starting its service. case identification, operator protected from effects fraudulent access. addition, user must be eavesdropping. This achieved encrypting data transmitted over radio interface. Thus, authentication UMTS, network, out using encryption with common key "hack-response" protocol (the authenticating party sends random number authenticated party, encrypts it certain algorithm returns result back).
منابع مشابه
Ensuring Data Storage Security in Cloud Computing
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, h...
متن کاملEnsuring Data Security & Consistency in FTIMA - A Fault Tolerant Infrastructure for Mobile Agents
Transaction management is one of the most crucial requirements for enterprise application development which often require concurrent access to distributed data shared amongst multiple application / nodes. Transactions guarantee the consistency of data records when multiple users or processes perform concurrent operations. Existing Fault Tolerance Infrastructure for Mobile Agents (FTIMA) provide...
متن کاملEnsuring Data Security and Consistency in FTIMA - A Fault Tolerant Infrastructure for Mobile Agents
Transaction management is one of the most crucial requirements for enterprise application development which often require concurrent access to distributed data shared amongst multiple application / nodes. Transactions guarantee the consistency of data records when multiple users or processes perform concurrent operations. Existing Fault Tolerance Infrastructure for Mobile Agents (FTIMA) provide...
متن کاملEnsuring authenticity and security in mobile device payment schemes
Even though mobile technology is becoming increasingly prevalent in modern life, the population is still largely unwilling to use mobile payment systems [9]. Furthermore, the longstanding concerns over the legitimacy of users can be solved by having the remote server verify the user by using remote user authentication [10]. Thus it follows that it is worth exploring techniques for mobile device...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie ?rodowiska
سال: 2022
ISSN: ['2083-0157', '2391-6761']
DOI: https://doi.org/10.35784/iapgos.2877