6. Conclusion

ثبت نشده
چکیده

As already mentioned, the key distribution can be made simple and effective with smart cards which also contain the DES algorithm. The cards are customised by the operator and sent to each individual subscriber. The key stored in the card is uniquely related to the subscribers logical directory number, which again is uniquely related to the physical line. A smart card can thus only be used by the subscriber it is intended for. However, the keys must be protected so that an intruder can not misuse it to fabricate a counterfeited smart card. Counterfeits will, if successful, allow an intruder to connect to the line and masquerade as the real subscriber in the same way as shown in Figure 1. 5.5. Compatibility and Feature Interaction The AD is best suited to be used together with DTMF terminal equipment, but it will still be possible to use it with rotary dial sets or other older equipment using register signalling. It would then be necessary to define the state " Wait for Challenge " from Figure 8 to also be transparent so that conversation can take place. This is because rotary sets use alternated high and low impedance register signalling, which would cause the AD to jump between the first two states and then finally end up in " Wait for Challenge " when the last digit has been dialled. In addition, the local exchange must be able to receive both rotary and DTMF signalling during the same call. Most telephone exchanges allow DTMF equipment to use the " Recall " function which in fact is a calibrated period of high impedance. The Recall function can be used for many purposes. Sometimes a Recall alone can activate a service, and in other cases the subscriber receives a special dialtone as invitation to dial a new directory number or a special service code. Because the AD will be in " Wait for Challenge " after a Recall, it is now possible to challenge the AD for each new service or new directory number called, which would make it impossible for an intruder to take over a call which is already established, and use it to make further calls. We have analysed the problem of theft (misuse or resources) in analogue telephone access networks , and described how to solve the problem by introducing authentication of the legitimate subscriber by an authentication module. By …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development of a scoring rubric for A to F grading and assessment of Master ’ s Theses that are using quantitative

2) Missing Too long or too short or key words missing does not contain background, aim, results and conclusion 200-300 words with 4-6 key words. Contains background, aim, results and conclusion 200-300 words with 4-6 key words, with relevant background, aim, results and conclusion 200-300 words with 4-6 key words. Well written with relevant background, aim, results and conclusion 200-300 words ...

متن کامل

AEROTRACKER- vision based target tracking quadcopter

................................................................................................................................................... 3 Executive Summary ................................................................................................................................3 Introduction .........................................................................................

متن کامل

Changes in the subgingival biofilm composition after coronally positioned flap

OBJECTIVES This study evaluated the effects of coronally positioned flap (CPF) on the subgingival biofilm composition. MATERIAL AND METHODS Twenty-two subjects with gingival recessions were treated with CPF. Clinical parameters were assessed before and at 6 months after surgery. Subgingival biofilms were analyzed by checkerboard DNA-DNA hybridization technique for 40 bacterial species. RESU...

متن کامل

Time window of TNF- in innate immunity against staphylococcal infection

..................................................................................................................................... 3 Introduction ................................................................................................................................ 4 Staphylococcus aureus ..................................................................................................

متن کامل

Alternative Sources of Energy— An Introduction to Fuel Cells

........................................................................................................................................................... Introduction .................................................................................................................................................... History ..........................................................................

متن کامل

Sand Simulation - COMP768 project report

4 Proposed Method and Progress 4 4.1 Proposed method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 4.2 Progress Made . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4.2.1 Coding effort . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4.2.2 Results . . . . . . . . . . . . . . . ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996