Security in 2.5G Mobile Systems

نویسنده

  • Christos Xenakis
چکیده

The global system for mobile communications, (GSM) is the most popular standard that implements second generation (2G) cellular systems. 2G systems combined with general packet radio services (GPRS) (3GPP TS 03.6, 2002) are often described as 2.5G, that is, a technology between the 2G and third generation (3G) of mobile systems. GPRS is a service that provides packet radio access for GSM users. The GPRS network architecture, which constitutes a migration step toward 3G sysAbstrAct

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Impact of Prior Usage Experience on the Intention to Adopt 3G Mobile Service for the Youth in Hong Kong

Third generation (3G) mobile service has been launched for several years and yet the information systems (IS) community has not yet gained a full understanding of how various technological and social factors affect the intention to adopt this technology. This study probes into this issue using the Innovation Diffusion Theory (IDT) (Rogers, 1995) along with two other constructs, i.e., subjective...

متن کامل

An Architecture for Mobile Web Business Systems: Applied to the Healthcare Sector

Mobile business solutions are one of the most attractive products of mobile information services today. Furthermore, most current mobile businesses and mobile solution providers are contributing to the process of convergence. The existing mobile 2.5G (e.g. GPRS) networks combined with Internet-based services limit many current ideas and solutions. However, 2.5G mobile technologies can be a very...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Polar Transmitter Pre-Distortion Technique Validated with 2.5G Mobile Communication Signals

This paper presents a polar transmitter predistortion technique validated with 2.5G mobile communication signals. The methodology used, [1], complements the drain bias modulation with a proper input drive level variation. This technique is believed to improve the linearity, while maintaining the efficiency of such transmitters, and it was validated in a real laboratory test setup.

متن کامل

Guest editorial: Mobility and resource management in next generation wireless systems

S ECOND GENERATION (2G) wireless systems such as Global System for Mobile communications (GSM), Personal Digital Cellular (PDC), North American Time Division Multiple Access (NA-TDMA), and Code Division Multiple Access (CDMAone) have brought mobile telephony to an impressive worldwide market. The deployment of next generation (NG) wireless systems, including 2.5G General Packet Radio Service (G...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015