MOBILE COMMUNICATION SYSTEMS AND SECURITY
|
|
- Corey Beasley
- 8 years ago
- Views:
Transcription
1 MOBILE COMMUNICATION SYSTEMS AND SECURITY Man Young Rhee Endowed Chair Professor Kyung Нее University, Republic of Korea IEEE IEEE PRESS IEEE Communications Society, Sponsor John Wiley & Sons (Asia) Pte Ltd
2 Contents Preface Acknowledgement About the Author Abbreviations xi xvii xix xxi 1 Global System for Mobile Communications GSM Bandwidth Allocation GSM System Architecture Mobile Station (SIM + ME) Base Station Subsystem (BSS) Network Subsystem (NSS) Operating Subsystem (OSS) GSM Transmission Network Architecture Message Management Layer (Layer 3) Data Link Layer (Layer 2) Physical Layer (Layer 1) Signaling Channels on the Air Interface Broadcast Channels (BCHs) Common Control Channels (CCCHs) Dedicated Control Channel (DCCH) GSM Security Architecture GSM Authentication GSM Confidentiality Multiple Encryption Encryption by AES Rijndael Algorithm 24 2 cdmaone IS-95A Technology Reverse CDMA Channel Reverse Traffic Channel Access Channel Multiplex Option i Information Multiplex Option 2 Information 65
3 VI Contents 2.2 Forward CDMA Channel Pilot Channel Sync Channel Paging Channel Forward Traffic Channel 86 3 General Packet Radio Service (GPRS) GPRS System Architecture GPRS Network Support Nodes Reference Points and Data Transfer Interfaces Signaling Transfer Interfaces GPRS-PLMN Backbone Networks GPRS Logical Functions Network Access Control Packet Transfer and Routing Mobility Management State Models for Location Management State Transitions of a Mobile Station Packet Mobility Management (I u Mode) Layered Protocol Architecture of Transmission Plane User Plane for A/G b Mode Control Plane for A/G b Mode Control Plane for I u Mode GPRS Ciphering Algorithm Parameters for Algorithm Design GPRS Encryption Algorithm 3 (GEA3) Ciphering and Deciphering Third-generation Partnership Projects (3GPP and 3GPP2) G Partnership Projects Evolution of Mobile Radio Technologies G Mobile Radio Technologies G Mobile Radio Technologies G Mobile Radio Technologies (Situation and Status of 3G) Cryptographic Protocols Applicable to Wireless Security Technologies Universal Mobile Telecommunication System (UMTS) UMTS Standardization FDD/TDD Modes for UTRA Operation UMTS Architecture UTRAN Architecture UTRAN Terrestrial Interface Horizontal Layers Vertical Planes UTRAN-CN Interface via I 138
4 Contents I u CS Protocol Structure I u PS Protocol Structure UMTS Security Related Features KASUMI Encryption Function User and Signaling Data Confidentiality KGCORE (Core Keystream Generation Function) Summary of Four Confidentiality Functions Key Scheduling UTRAN Overall Functions UTRAN I ub Interface Protocol Structure UTRAN I ur Interface Protocol Structure 165 High Speed Downlink Packet Access (HSDPA) Basic Structure of HS-DSCH Protocol Structure HS-DSCH Physical Layer Model Overview of HSDPA Enhancement Technologies CQI Enhancement (FDD Mode) Multiple Simultaneous Transmission to a UE Within Sub-Frame Code Reuse for Downlink HS-DSCH Fast Signalling Between Node В and UE Fast Adaptive Emphasis ACK/NACK Transmit Power Reduction for HS-DPCCH Fractional Dedicated Physical Channel (F-DPCH) HS-DSCH MAC Architecture UE Side Overall Architecture MAC-d Entity MAC-c/sh Entity MAC-hs Entity MAC-ehs Entity HS-DSCH MAC Architecture UTRAN Side Overall MAC Architecture MAC-c/sh Entity MAC-hs Entity MAC-ehs Entity Overview of HSDPA Techniques to Support UTRA Adaptive Modulation and Coding (AMC) Hybrid ARQ (HARQ) Fast Cell Selection Multiple Input Multiple Output Antenna Processing Handling for Error Cases Orthogonal Frequency Division Multiplexing (OFDM) OFDM Modulation Scheme Signal Processing Over OFDM Transceiver Prospect of OFDM-based Applications 195
5 viii Contents 7 CDMA2000 lx High Rate Packet Data System (lxev-do) Architectural Reference Protocol Model Air Interface Layering Protocol Application Layer Protocols Multi-Flow Packet Application Stream Layer Protocol Protocol Initialization Procedures and Messages for the InConfiguration and InUse Instances Session Layer Protocol Default Session Management Protocol (SMP) Default Address Management Protocol (AMP) Default Session Configuration Protocol Connection Layer Protocol Data Encapsulation for InUse Protocol Instance Air-Link Management Protocol Initialization State Protocol Idle State Protocol Connected State Protocol Route Update Protocol Packet Consolidation Protocol Overhead Messages Protocol Security Layer Protocols Security Layer Encapsulation Default Security Protocol Diffie-Hellman Key Exchange Protocol Access Terminal (AT) Requirements Access Network (AN) Requirements Authentication Key and Encryption Key Generation MAC Layer Protocols Data Encapsulation for the MAC Protocols Control Channel MAC Protocol Procedures and Messages for the InUse Instance Control Channel Capsules Access Channel MAC Protocol Forward Traffic Channel MAC Protocol Reverse Traffic Channel MAC Protocol Physical Layer Protocol Subtype 0 (Default) and Subtype 1 Physical Layer Protocol Frame Check Sequence (FCS) Computation Role of Access Terminal Access Network Requirements 269
6 IX CDMA2000 lx Evolution-Data and Voice (IxEV-DV) UMTS (WCDMA) Versus CDMA2000 Physical Layer Harmonization Reverse CDMA Channel Reverse Pilot Channel (R-PICH) Reverse Secondary Pilot Channel (R-SPICH) Access Channel Enhanced Access Channel (R-EACH) Reverse Common Control Channel (R-CCCH) Reserve Packet Data Control Channel (R-PDCCH) Reverse Request Channel (R-REQCH) Reverse Dedicated Control Channel (R-DCCH) Reverse Acknowledgment Channel (R-ACKCH) Reverse Channel Quality Indicator Channel (R-CQICH) Reverse Fundamental Channel (R-FCH) Reverse Supplemental Channel (R-SCH) Reverse Supplemental Code Channel (R-SCCH) Reverse Packet Data Channel (R-PDCH) Forward CDMA Channel Pilot Channels Sync Channel (F-SYNCH) Paging Channel (F-PCH) Quick Paging Channel (F-QPCH) Broadcast Control Channel (F-BCCH) Common Assignment Channel (F-CACH) Forward Common Control Channel (F-CCCH) Forward Indicator Control Channel (F-ICCH) Forward Grant Channel (F-GCH) Forward Acknowledgment Channel (F-ACKCH) Forward Packet Data Control Channel (F-PDCCH) Forward Dedicated Control Channel (F-DCCH) Forward Fundamental Channel (F-FCH) Forward Supplemental Channel (F-SCH) Forward Supplemental Code Channel (F-SCCH) Forward Packet Data Channel (F-PDCH) CDMA2000 Entities and Service Interfaces CDMA2000 lx EV-DV Service Interface Structure (Mobile Station) 332 Advanced Encryption Standard and Elliptic Curve Cryptosystems Advanced Encryption Standard (AES) Notational Conventions Mathematical Operations AES Algorithm Specification Key Expansion AES Cipher AES Inverse Cipher 354
7 X Contents 9.2 Elliptic Curve Cryptosystem (ECC) Elliptic Curves Elliptic Curves Over Prime Field Z p Elliptic Curve Over Finite Galois Field GF(2 m ) Elliptic Curve Cryptosystem versus Public-Key Cryptosystems Diffie-Hellman Key Exchange Elliptic Curve Diffie-Hellman Key Exchange RSA Signature Algorithm Elliptic Curve RSA Signature Algorithm ElGamal Public-Key Encryption Elliptic Curve ElGamal Encryption Schnorr's Authentication Algorithm EC Schnorr's Authentication Protocol Public-Key Digital Signature Algorithm Elliptic Curve Digital Signature Algorithm Hash Function, Message Authentication Code, and Data Expansion Function MD5 Message-Digest Algorithm Append Padding Bits Append Length Initialize MD Buffer Define Four Auxiliary Functions (F, G, H, I) FF, GG, HH, and II Transformations for Rounds 1, 2, 3, and Computation of Four Rounds (64 Steps) Secure Hash Algorithm (SHA-1) Message Padding Initialize 160-Bit Buffer Functions Used Constants Used Computing the Message Digest Hashed Message Authentication Codes (HMAC) HMAC Structure HMAC Computation Using RFC Method HMAC Computation (Alternative Method) Data Expansion Function 412 Bibliography 417 Index 421
Security WILEY. Wireless Mobile Internet. Second Edition. Man Young Rhee. Endowed Chair Professor, Kyung Hee University
Wireless Mobile Internet Security Second Edition Man Young Rhee Endowed Chair Professor, Kyung Hee University Professor Emeritus, Hanyang University, Republic of Korea WILEY A John Wiley & Sons. Ltd.,
More informationIndex. Common Packet Channel (CPCH) 25 Compression 265, 279 82, 288 header compression 284
bindex.fm Page 296 Tuesday, March 22, 2005 7:17 AM Index 2G, 2.5G, 3G 13 3GPP 118 Release 5 (Rel 5) 124 Release 6 (Rel 6) 125 Release 97/98 (Rel 97/98) 119 Release 99 (Rel 99) 120 4 3GPP2 129 4G 13, 44
More information3G CDMA2000 Wireless System Engineering
3G CDMA2000 Wireless System Engineering For a listing of recent titles in the Artech House Mobile Communications Library, turn to the back of this book. 3G CDMA2000 Wireless System Engineering Samuel C.
More informationWireless Mobile Internet Security. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2330593/ Wireless Mobile Internet Security. 2nd Edition Description: The mobile industry for wireless cellular services has grown
More information192620010 Mobile & Wireless Networking. Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4]
192620010 Mobile & Wireless Networking Lecture 5: Cellular Systems (UMTS / LTE) (1/2) [Schiller, Section 4.4] Geert Heijenk Outline of Lecture 5 Cellular Systems (UMTS / LTE) (1/2) q Evolution of cellular
More information3GPP Wireless Standard
3GPP Wireless Standard Shishir Pandey School of Technology and Computer Science TIFR, Mumbai April 10, 2009 Shishir Pandey (TIFR) 3GPP Wireless Standard April 10, 2009 1 / 23 3GPP Overview 3GPP : 3rd Generation
More informationMobile Communications TCS 455
Mobile Communications TCS 455 Dr. Prapun Suksompong prapun@siit.tu.ac.th Lecture 26 1 Office Hours: BKD 3601-7 Tuesday 14:00-16:00 Thursday 9:30-11:30 Announcements Read the following from the SIIT online
More informationPDF vytvořeno zkušební verzí pdffactory www.fineprint.cz UMTS
UMTS Generations of mobile systems Generation 1 (1980-1995) 2 (1992-2000) 2,5 (1999-2010) 3 (2004-20?) Names NMT (Nordic Mobile Telephone); 450 MHz, 900 MHz AMPS (Advance Mobile Telephone System); USA
More informationTable of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
More informationCellular Network Planning and Optimization Part XI: HSDPA. Jyri Hämäläinen, Communications and Networking Department, TKK, 25.1.
Cellular Network Planning and Optimization Part XI: HSDPA Jyri Hämäläinen, Communications and Networking Department, TKK, 25.1.2008 HSDPA HSDPA = High Speed Downlink Packet Access. Release 5 was the first
More informationEvolution of the Air Interface From 2G Through 4G and Beyond
Evolution of the Air Interface From 2G Through 4G and Beyond Presentation to IEEE Ottawa Section / Alliance of IEEE Consultants Network (AICN) - 2nd May 2012 Frank Rayal BLiNQ Networks/ Telesystem Innovations
More informationCS 8803 - Cellular and Mobile Network Security: CDMA/UMTS Air Interface
CS 8803 - Cellular and Mobile Network Security: CDMA/UMTS Air Interface Hank Carter Professor Patrick Traynor 10/4/2012 UMTS and CDMA 3G technology - major change from GSM (TDMA) Based on techniques originally
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More information1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7
Figures and Tables About the Authors Preface Foreword Acknowledgements xi xix xxi xxiii xxv 1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7 2 Overview
More informationMobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
More informationHSDPA Mobile Broadband Data A Smarter Approach to UMTS Downlink Data
HSDPA Mobile Broadband Data A Smarter Approach to UMTS Downlink Data UMTS mobile wireless systems have enjoyed widespread uptake of high-quality circuit-switched applications like voice and video telephony.
More informationEvolution of GSM in to 2.5G and 3G
CMPE 477 Wireless and Mobile Networks Evolution of GSM in to 2.5G and 3G New Data Services for GSM CMPE 477 HSCSD GPRS 3G UMTS IMT2000 UMTS Architecture UTRAN Architecture Data services in GSM I Data transmission
More information2G/3G Mobile Communication Systems
2G/3G Mobile Communication Systems Winter 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline 2G Review: GSM Services Architecture Protocols Call setup Mobility management
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationEETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: Cellular Overview: 3G and 4G http://lyle.smu.edu/~skangude/eets8316.html Dr. Shantanu Kangude skangude@lyle.smu.edu Third Generation Systems High-speed wireless
More informationPradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur
Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur ABSTRACT W-CDMA (Wideband Code-Division Multiple Access), an ITU standard derived
More informationContents. Preface. Acknowledgement. About the Author. Part I UMTS Networks
Contents Preface Acknowledgement About the Author Acronyms xv xxi xxiii xxv Part I UMTS Networks 1 Introduction 3 1.1 Mobile Telecommunication Networks and Computer Networks 4 1.2 Network Design Principles
More informationHow To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationFachgebiet für Kommunikationstechnik. Prof. Dr.-Ing. Klaus David. HSDPA for UMTS. Stephan Sigg 18.04.2005
Fachgebiet für Kommunikationstechnik Prof. Dr.-Ing. Klaus David HSDPA for UMTS Stephan Sigg 18.04.2005 Gliederung HSDPA Concepts HSDPA Control Channels HSUPA Fast Scheduling in HSDPA Fachgebiet für Kommunikationstechnik
More informationRole and Evolution of Radio Network Controllers
01001000100000110000001000001100 010010001000 Role and Evolution of Radio Network Controllers Pekka Varis SPRP501 Senior R&D Manager / Senior Specialist Nokia pekka.ju.varis@nokia.com Agenda Radio Network
More informationImpact of Flexible RLC PDU Size on HSUPA Performance
Nash Technologies Your partner for world-class custom software solutions & consulting Enrico Jugl, Michael Link, Jens Mueckenheim* *Hochschule Merseburg, Germany Outline Motivation Flexible RLC PDU Size
More informationSecurity Evaluation of CDMA2000
Security Evaluation of CDMA2000 L. Ertaul 1, S. Natte 2, and G. Saldamli 3 1 Mathematics and Computer Science, CSU East Bay, Hayward, CA, USA 2 Mathematics and Computer Science, CSU East Bay, Hayward,
More informationCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New
More informationIT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 11, November 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated
More informationWireless Cellular Networks: 3G
Wireless Cellular Networks: 3G Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 7-1 Overview Wireless
More informationCRYPTOG NETWORK SECURITY
CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;
More informationGSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)
GSM Example of a PLMN (Public Land Mobile Network) At present most successful cellular mobile system (over 200 million subscribers worldwide) Digital (2 nd Generation) cellular mobile system operating
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationContents. Biography. Acknowledgments. List of Abbreviations. List of Symbols
Contents Biography Preface Acknowledgments List of Abbreviations List of Symbols xi xiii xvii xix xxvii 1 Introduction 1 1.1 Cellular Mobile Communication Systems 1 1.1.1 The Cellular Concept 2 1.1.2 Propagation
More informationProduct Description. HiLink E3531 HSPA+ USB Stick V100R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2013-6-13
HiLink E3531 HSPA+ USB Stick V100R001 Issue 01 Date 2013-6-13 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel
More informationCDMA Network Planning
CDMA Network Planning by AWE Communications GmbH www.awe-com.com Contents Motivation Overview Network Planning Module Air Interface Cell Load Interference Network Simulation Simulation Results by AWE Communications
More informationKeyStone Architecture Security Accelerator (SA) User Guide
KeyStone Architecture Security Accelerator (SA) User Guide Literature Number: SPRUGY6B January 2013 Release History www.ti.com Release Date Description/Comments SPRUGY6B January 2013 Added addition engine
More informationMobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014
Mobile Computing CSE 40814/60814 Fall 2014 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch
More informationNetwork Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua 2013.07
Network Access Security in Mobile 4G LTE Huang Zheng Xiong Jiaxi An Sihua 2013.07 Outline Mobile Evolution About LTE Overview of LTE System LTE Network Access Security Conclusion Mobile Evolution Improvements
More informationIP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com
IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationLTE Overview October 6, 2011
LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term
More informationPriority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE
Priority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE S. Saha * and R. Quazi ** * Helsinki University of Technology, Helsinki, Finland ** University of Dhaka, Dhaka, Bangladesh
More informationAuthentication and Security in Mobile Phones
Authentication and Security in Mobile Phones Greg Rose QUALCOMM Australia ggr@qualcomm.com ABSTRACT Mobile telephone systems have a checkered reputation regarding security and authentication features after
More informationChapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National
More informationHSDPA Throughput Performances Using an Experimental HSDPA Transmission System
NTT DoCoMo Technical Journal Vol. 6 No.4 HSDPA Throughput Performances Using an Experimental HSDPA Transmission System Shinya Tanaka, Hiroyuki Ishii, Tomoki Sao, Yousuke Iizuka and Takeshi Nakamori The
More informationAuthentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
More informationSolution for cell edge performance improvement and dynamic load balancing. Qualcomm Technologies, Inc.
HSPA+ Multiflow Solution for cell edge performance improvement and dynamic load balancing Feburary 1, 2014 Qualcomm Technologies, Inc. Not to be used, copied, reproduced, or modified in whole or in part,
More informationSecure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
More informationSecurity Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra
Security Architecture in UMTS Third Generation Cellular Networks Tomás Balderas-Contreras René A. Cumplido-Parra Reporte Técnico No. CCC-04-002 27 de febrero de 2004 Coordinación de Ciencias Computacionales
More informationGPRS Systems Performance Analysis
GPRS Systems Performance Analysis Fátima de Lima Procópio Duarte, Antonio A.F. Loureiro, Leonardo Barbosa e Oliveira, Cláudio Márcio de Souza Vicente Federal University of Minas Gerais, Belo Horizonte,
More informationARIB STD-T64-C.S0042 v1.0 Circuit-Switched Video Conferencing Services
ARIB STD-T-C.S00 v.0 Circuit-Switched Video Conferencing Services Refer to "Industrial Property Rights (IPR)" in the preface of ARIB STD-T for Related Industrial Property Rights. Refer to "Notice" in the
More informationProduct Description. HUAWEI E3372s-153 LTE USB Stick (Cat.4) HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2014-01-14
HUAWEI E3372s-153 LTE USB Stick (Cat.4) Issue 01 Date 2014-01-14 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please
More informationTelesystem Innovations. LTE in a Nutshell: Protocol Architecture WHITE PAPER
Telesystem Innovations LTE in a Nutshell: Protocol Architecture WHITE PAPER PROTOCOL OVERVIEW This whitepaper presents an overview of the protocol stack for LTE with the intent to describe where important
More informationWireless Cellular Networks: 1G and 2G
Wireless Cellular Networks: 1G and 2G Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available
More informationArchitecture Overview NCHU CSE LTE - 1
Architecture Overview NCHU CSE LTE - 1 System Architecture Evolution (SAE) Packet core networks are also evolving to the flat System Architecture Evolution (SAE) architecture. This new architecture optimizes
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationThroughput for TDD and FDD 4 G LTE Systems
Throughput for TDD and FDD 4 G LTE Systems Sonia Rathi, Nisha Malik, Nidhi Chahal, Sukhvinder Malik Abstract Long Term Evolution (LTE) has been designed to support only packet-switched services. It aims
More informationGSM Network and Services
GSM Network and Services GPRS - sharing of resources 1 What is the problem? Many data applications are very bursty in its traffic pattern: http, smtp, pop, telnet,... Why reserve physical resources at
More informationDiameter in the Evolved Packet Core
Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband
More informationCircuit-Switched Voice Services over HSPA
Circuit-Switched Voice Services over HSPA 1 Qualcomm Incorporated, Corporate R&D San Diego, USA Abstract Circuit-Switched (CS) Voice Services over HSPA (CSoHS) was recently introduced for 3GPP WCDMA Release
More informationALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS
QUICK LOOK ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS The Cisco RAN Optimization solution offers alternative radio access network (RAN) backhaul transport and data offload
More information11557 - CRIPT - Cryptography and Network Security
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 744 - ENTEL - Department of Network Engineering DEGREE IN ELECTRONIC ENGINEERING (Syllabus 1992). (Teaching unit Optional) MASTER'S
More informationCRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
More informationcommunication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
More informationGSM v. CDMA: Technical Comparison of M2M Technologies
GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple
More informationRevision of Lecture Eighteen
Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses
More informationCS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
More informationSecurity Requirements for Wireless Networking
Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END
More informationMobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
More informationFrom GSM to LTE-Advanced. An Introduction to Mobile Networks and Mobile Broadband. Revised Second Edition
Brochure More information from http://www.researchandmarkets.com/reports/2882934/ From GSM to LTE-Advanced. An Introduction to Mobile Networks and Mobile Broadband. Revised Second Edition Description:
More informationInter-Cell Interference Coordination (ICIC) Technology
Inter-Cell Interference Coordination (ICIC) Technology Dai Kimura Hiroyuki Seki Long Term Evolution (LTE) is a promising standard for next-generation cellular systems targeted to have a peak downlink bit
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationCustomer Training Catalog Course Descriptions WCDMA RNP&RNO Technical Training
Customer Training Catalog Course Descriptions Customer Training Catalog Course Descriptions WCDMA RNP&RNO Technical Training HUAWEI Learning Service 2015 COMMERCIAL IN CONFIDENCE 1 Customer Training Catalog
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
More informationLTE Multimedia Broadcast Multicast Services (MBMS)
LTE Multimedia Broadcast Multicast Services (MBMS) LTE is the technology of choice for mobile operators because it delivers significantly higher bandwidth with the lowest amount of spectral resources.
More informationOther VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
More informationChapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
More informationTitle: Comparison of Broadcast and Multicast Proposals, Revision 1
WG Conference Call C0-00088-060R1 Title: Comparison of Broadcast and Multicast Proposals, Revision 1 Abstract: Source: This contribution compares the four broadcast and multicast related proposals in TSG-C.
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationBroadcast Services and QoS Control Provided by 3rd-generation Mobile Communication Technology 1xEV-DO
Hitachi Review Vol. 55 (Feb. 2006) 1 Broadcast Services and QoS Control Provided by 3rd-generation Mobile Communication Technology 1xEV-DO Naohisa Hamaguchi Takashi agei Shiro Mazawa Yosuke Takahashi OVERVIEW:
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
More informationLTE PHY Fundamentals Roger Piqueras Jover
LTE PHY Fundamentals Roger Piqueras Jover DL Physical Channels - DL-SCH: The DownLink Shared CHannel is a channel used to transport down-link user data or Radio Resource Control (RRC) messages, as well
More informationOverview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
More informationCryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
More informationNetwork Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
More informationAN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
More informationLTE protocol tests for IO(D)T and R&D using the R&S CMW500
LTE protocol tests for IO(D)T and R&D using the R&S CMW500 The standardization of layer 3 signaling for the new UMTS long term evolution (LTE) standard is almost complete, and Rohde & Schwarz is ready
More informationHSPA+ and LTE Test Challenges for Multiformat UE Developers
HSPA+ and LTE Test Challenges for Multiformat UE Developers Presented by: Jodi Zellmer, Agilent Technologies Agenda Introduction FDD Technology Evolution Technology Overview Market Overview The Future
More informationRBS 6000 Training Programs. Catalog of Course Descriptions
RBS 6000 Training Programs Catalog of Course Descriptions Page 2 2 Telephone: +46 8 757 0000 Page 3 Catalog of Course Descriptions INTRODUCTION... 5 GSM RADIO NETWORK OVERVIEW... 7 WCDMA RADIO ACCESS NETWORK
More informationMobile Services (ST 2010)
Mobile Services (ST 2010) Chapter 2: Mobile Networks Axel Küpper Service-centric Networking Deutsche Telekom Laboratories, TU Berlin 1 Mobile Services Summer Term 2010 2 Mobile Networks 2.1 Infrastructure
More informationVoIP Shim for RTP Payload Formats
PITALS 50 pt 32 pt VoIP Shim for RTP Payload Formats draft-johansson-avt-rtp-shim Ingemar Johansson, Ericsson AB Outline MTSI in 3GPP Voice service requirements Problems with RTCP Why is inband signaling
More informationDimensioning, configuration and deployment of Radio Access Networks. part 5: HSPA and LTE HSDPA. Shared Channel Transmission
HSDPA Dimensioning, configuration and deployment of Radio Access Networks. part 5: HSPA and LTE Enhanced Support for Downlink Packet Data Higher Capacity Higher Peak data rates Lower round trip delay Part
More informationProduct Description. HUAWEI B683 Wireless Gateway V100R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2010-11-19
HUAWEI B683 Wireless Gateway V100R001 Issue 01 Date 2010-11-19 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel
More informationLTE-Advanced Carrier Aggregation Optimization
Nokia Networks LTE-Advanced Carrier Aggregation Optimization Nokia Networks white paper LTE-Advanced Carrier Aggregation Optimization Contents Introduction 3 Carrier Aggregation in live networks 4 Multi-band
More information