The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
GSM and UMTS radio network will coexist for a long time. Interoperation of GSM and UMTS network will be a more important issue in the future. The authentication mechanism is key problem in GSM/UMTS inter-system. The verification method based on finite state machine is an important method to describe the state changes of complex and interactive system. It is simple formally and easy to describe target...
With the construction of 3G networks and the development of mobile internet, mobile service is updating quickly. Meanwhile, the mobile phone viruses became the next target. Mobile phone viruses are a destructive procedure, just like the computer virus (program), which is also infectious and destructive. This will constraint the development of the smart mobile phones. The study of the characteristics...
This demonstration shows an innovative concept that introduces PKI for mobile operators. A commercial 3G dongle is equipped with an USIM module used for subscriber's authentication. The USIM embeds a tiny SSL stack written for java cards. The 3G modem delivers internet connectivity and realizes strong mutual SSL authentication providing, in the presented use case, seamless access to real OPENID services.
Mobile platform is the foundation to protect the security of mobile application. How to design and implement the trusted and effective mobile platform is the problem need to be resolved. On the basis of comprehensive study of trusted computing technology and the threats to 3G network, the architecture of trusted mobile platform based on mobile trusted module is proposed, and. a predicate logic based...
The security concerns in 3G network, especially the core network, is far from being satisfied. As the most important protocol in the 3G core network, GPRS Tunnel Protocol (GTP) is quite vulnerable to attacks in the flat, full IP environment. Solving such a problem properly is very urgent and important for the operation of 3G network. In this paper, we discus the security issues in GTP, and propose...
Along with the rapid development of 3rd generation mobile communication technologies, the applications of M-Commerce have been greatly expanded. Based on the research and analysis of the J2ME platform, this paper proposes a secure architecture for M-Commerce systems under the 3G networks. The proposed solution is the combination of J2EE and J2ME capabilities based on the three-tier architecture, as...
This paper seeks to integrate different impressive access technologies to build a kind of innovative mobile business model. It analyzes the requirements of mobile business in the age of the 3rd generation wireless communication infrastructure (3G), present a set of mobile business solution in which the second generation ID card in China is used instead of all kinds of the existing IC or ID card for...
As the Chinese informationization has marched into the 3G (Third Generation Mobile Telephony) era, 3G-Based mobile government information system will guide the way of the development of E-government. Based on the analysis of the existing technology of China, this paper aims at providing more technological appliance and development channel for the government information disclosure. Besides, corresponding...
Nowadays, 3G netowrk plays a very important role in mobile communication system. But the security concern of such network, especially the core network, is far from being satisfied. GPRS Tunnel Protocol(GTP), which is one of the key protocols in the core network, is quite vulnerable to attacks in the flat, full IP environment. Therefore solving such problem properly is very urgent and important for...
3G standards including W-CDMA, CDMA2000, TD-SCDMA can provide high-speed data service. Now, 3G technologies have been employed in many fields. In this paper, we mainly discuss the key technologies of using 3G mobile system to construct remote monitor system. Compared to other communication technologies, 3G technologies have many advantages. While we use 3G mobile system to construct remote monitor...
This paper is a continuation regarding the proposed architecture on multimodality discussed by Armoogum et al. It proposes further enhancements on the current architecture and explores other possibilities regarding its application in Mauritius. The enhanced architecture for multimodality is deployed on a 3G network instead using of only conventional GSM network and local phones line. This give rises...
To provide secure communication for universal mobile telecommunications system (UMTS) Mobile Networks, authentication and key agreement (AKA) is carried out between the user and the home environment, and the authentication protocol is an important primitive for entity authentication and session keys. The current authentication protocol is giving a reasonable security level. However it is overloading...
In this paper we propose two new attacks on UMTS network. Both attacks exploit the UMTS-GSM interworking and are possible in the GSM access area of UMTS network. The first attack allows the attacker to eavesdrop on the entire traffic of the victim UMTS subscriber in the GERAN coverage of the UMTS network. The second attack is an impersonation attack i.e. the attacker impersonates a genuine UMTS subscriber...
Femtocell, a small cellular base station in home and small business environment, is an attractive solution for operators to improve indoor coverage and network capacity in 3G networks. However, there are technical problems due to its mass deployment. The paper presents a femtocell architecture for LTE and investigates different handover scenarios. Two mobility management schemes at radio network layer...
IMSI (International Mobile Station Identity) is a unique number associated with all GSM and UMTS network mobile phone user. IMSI filtering-a prefix filtering, is an important function in the 3G firewall. It is an indefinite filtering which affects the efficiency of the security device. This paper brings forward a parallel processing method which uses vector coding and structure of bloom filter. This...
For the lawful interception (LI) of the secure communications, ID-based cryptosystem has the property of key escrow that can be efficiently used for LI. However, it does not prevent the malicious use of the escrowed key by the LEA. Thus, we would like to propose a new key escrow model that enables the limited capability of lawful interception agency.
The focus of this paper is on access security aspects of 3G-WLAN interworking. Firstly, the authentication entities which do not rely on the concrete heterogeneous network are abstracted by analyzing 3G-WLAN multi-kind heterogeneous network model. And then a common authentication model is established and a novel access authentication and key agreement scheme combined elliptic curve cryptographic techniques...
Mobile E-commerce (M-commerce) service raises a number of security and privacy challenges. To address this, we propose an advanced mobile security solution and related security methodology based on distribute key without changing hardware configuration of the mobile devices. The solution consists of the UE (User Equipment), an electronic security key (eKey) which is connected to the mobile device...
IMSI (International Mobile Station Identity) is a unique number associated with all GSM and UMTS network mobile phone user. IMSI filtering - a prefix filtering, is an important function in the 3G firewall. It is an indefinite filtering which affects the efficiency of the security device. This paper brings forward a parallel processing method which uses vector coding and structure of bloom filter....
The mobile network operators (MNOs) would like to ensure the high level of security of their services to their customers without any inefficiency and protect their own business models from any adversary. However, due to the constraints of the mobile handsets, the dreams had seemed to be difficult to be realized till now. As the 3G mobile network has spread out widely and the technologies of smart...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.