An Approach to full User Data Integrity Protection in UMTS Access Networks

نویسنده

  • Ivo Pooters
چکیده

During development of the UMTS security standard, 3GPP had to take various constraining aspects, like bandwidth and limited hardware, into account, so there were compromises made in security. One such compromise is the absence of a full userdata integrity protection mechanism. In this paper an approach is made to a full user data integrity protection mechanism in the UMTS access network. The current integrity threats and existing solutions are examined for both typical networks as well as for the UMTS standard. The abovementioned solutions are compared on their relevant characteristics (security level and performance). With the requirements of UMTS networking in mind, the most suitable solution is selected and the consequences for performance and security in the UMTS access network are assessed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

VGSN: a gateway approach to interconnect UMTS/WLAN networks

High tier wireless systems such as GPRS and UMTS provide users high mobility but less bandwidth. On the other hand, low tier wireless systems such as Wireless LAN offer high bandwidth with less mobility. To support seamless roaming between heterogeneous wireless networks is regarded as one of the key issues in the future mobile communication system. The paper presents method and system for seam...

متن کامل

A new SDN-based framework for wireless local area networks

Nowadays wireless networks are becoming important in personal and public communication andgrowing very rapidly. Similarly, Software Dened Network (SDN) is an emerging approach to over-come challenges of traditional networks. In this paper, a new SDN-based framework is proposedto ne-grained control of 802.11 Wireless LANs. This work describes the benets of programmableAcc...

متن کامل

Power consumption in wireless access networks

The power consumption of wireless access networks will become an important issue in the coming years. In this paper the power consumption of base stations for mobile WiMAX, fixed WiMAX and UMTS is modelled. This power consumption is evaluated in relation to the coverage. For a physical bit rate of 2 Mbps, a power consumption of approximately 5600 W and a range of 1 km is obtained with UMTS. Fix...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006