Vulnerability by Design in Mobile Network Security
نویسندگان
چکیده
The GSM network, commonly called 2G, was designed during the 1980s when the Cold War was still on. Due to political pressure from European governments, the security of GSM was deliberately made weak to allow easy interception by law enforcement agencies. Despite strengthened security in subsequent mobile network technologies of 3G and 4G, the weak security of 2G represents the ‘weakest link’ and thereby limits the security level of mobile networks in general. This article describes the evolution of mobile network security architectures, analyses their security vulnerabilities, and proposes solutions to mitigate the threats posed by these vulnerabilities.
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملMANET: Security Issues and Behavior Analysis of Routing Protocol Using NS-2
A mobile ad hoc network (MANET) is formed with wireless mobile devices (nodes) without the need for existing network infrastructure. Security design in MANET (Mobile advoc network) is complicated because of its features including lack of infrastructure, mobility of nodes; dynamic topology and open wireless medium .Due to this MANET suffer from many security vulnerability. To enhance the securit...
متن کاملDesign and Development of a Secured Routing Scheme for Mobile Adhoc Network
The development of mobile ad hoc network advocates selforganized wireless interconnection of communication devices that would either extend or operate in concern with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network ...
متن کاملReview on security issues of AODV routing protocol for MANETs
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure, Instead, hosts rely on each other to keep the network connected. One main challenge in the design of these networks is their vulnerability to security attacks. In this Survey, we study the threats an ad hoc network faces a...
متن کامل