Security Mechanisms in UMTS

نویسندگان

  • Stefan Pütz
  • Roland Schmitz
  • Tobias Martin
چکیده

This contribution presents an overview of the security of the 3 generation mobile radio system UMTS as currently standardised by the 3 Generation Partnership Project 3GPP. We discuss the underlying principles and show to which extent the security of 2 generation systems as GSM is improved and enhanced by UMTS. The UMTS Authentication and Key Agreement protocol, the security algorithms deployed for UMTS and the interworking mechanisms between 2 and 3 generation systems are described in detail.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

UMTS security: system architecture and hardware implementation

Universal mobile telecommunication system (UMTS) has specified security mechanisms with extra features compared to the security mechanisms of previous mobile communication systems (GSM, DECT). A hardware implementation of the UMTS security mechanism is presented in this paper. The proposed VLSI system supports the Authentication and Key Agreement procedure (AKA), the data confidentiality proced...

متن کامل

Security in 3 Generation Mobile Networks

In the last few years, we have witnessed an explosion in demand for security measures motivated by the proliferation of mobile/wireless networks, the fixedmobile network convergence, and the emergence of new services, such as ecommerce. 3G-systems play a key role in this network evolution, and thus, all stakeholders are interested in the security level supported in the new emerging mobile envir...

متن کامل

IPsec-based end-to-end VPN deployment over UMTS

Next generation mobile users require flexible security mechanisms, which provide customized security services to data traffic, take into account end-user mobility and mobile network characteristics, and are available anywhere–anytime. An IPsecbased end-to-end Virtual Private Network (VPN) deployment scheme over the Universal Mobile Telecommunication System (UMTS) is proposed and analysed. The U...

متن کامل

An Approach to full User Data Integrity Protection in UMTS Access Networks

During development of the UMTS security standard, 3GPP had to take various constraining aspects, like bandwidth and limited hardware, into account, so there were compromises made in security. One such compromise is the absence of a full userdata integrity protection mechanism. In this paper an approach is made to a full user data integrity protection mechanism in the UMTS access network. The cu...

متن کامل

DoS attacks exploiting signaling in UMTS and IMS

The Universal Mobile Telecommunication Standard (UMTS) is continuously evolving to meet the growing demand of modern mobile and Internet applications for high capacity and advanced features in security and quality of service. Although admittedly enhanced in terms of security when compared to 2G systems, UMTS still has weaknesses that can lead to security incidents. In this paper we investigate ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Datenschutz und Datensicherheit

دوره 25  شماره 

صفحات  -

تاریخ انتشار 2001