Reducing the Security Threats to 2.5G and 3G Wireless Applications
نویسندگان
چکیده
Introduction..................................................................... Security Strata................................................................. Low-Level Security Needs.......................................... Mid-Level Security Needs .......................................... High-Level Security Needs......................................... A Security Platform......................................................... Crypto Engine ............................................................. Security Firmware / API.............................................. Security Applications and Peripherals...................... Getting Real..................................................................... Learning From Experience ............................................. Reducing the Security Threats and 3G Wireless Applications
منابع مشابه
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملA lightweight reconfigurable security mechanism for 3G/4G mobile devices
Wireless communications are advancing rapidly. We are currently on the verge of a new revolutionary advancement in wireless data communications: the third generation of mobile telecommunications. 3G promises to converge mobile technology with Internet connectivity. Wireless data, multimedia applications, and integrated services will be among the major driving forces behind 3G. While wireless co...
متن کاملGuest editorial: Mobility and resource management in next generation wireless systems
S ECOND GENERATION (2G) wireless systems such as Global System for Mobile communications (GSM), Personal Digital Cellular (PDC), North American Time Division Multiple Access (NA-TDMA), and Code Division Multiple Access (CDMAone) have brought mobile telephony to an impressive worldwide market. The deployment of next generation (NG) wireless systems, including 2.5G General Packet Radio Service (G...
متن کاملInternet-draft Tcp over 2.5g and 3g Wireless Networks Internet-draft Tcp over 2.5g and 3g Wireless Networks
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as refer...
متن کاملThe 3G-324M Protocol for Conversational Video Telephony
third-generation (3G) networks, conversational video-telephony services are becoming a key differentiator between new 3G offerings and existing 2G/2.5G services. Although it’s possible to have limited video-based services—such as a multimedia messaging service—that deliver pictures and video clips over 2.5G services, these are delay-insensitive applications that could run over a packet-based wi...
متن کامل