Mobile Office Security Requirements for the Mobile Office
|
|
|
- Laurel Jodie Hall
- 9 years ago
- Views:
Transcription
1 Mobile Office Security Requirements for the Mobile Office Alcatel SEL AG 20./
2 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used for Network Access Security Requirements Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 2
3 Mobile Networks Security Concepts in Mobile Networks GSM WAP UMTS Applications in Mobile Networks Mobile Terminal used for Network Access Security Requirements Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 3
4 Security Concepts in GSM mobile / fixed network Air Interface BTS BTS BSC MSC/VLR PLMN/PSTN HLR/AuC BSC encrypted BTS AuC HLR BTS BSC MSC VLR Authentication Center Home Location Register Base Transceiver Station Base Station Controller Mobile Switching Center Visitor Location Register subscriber authentication encrypted air interface anonymous identity Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 4
5 Authentication in GSM MSC/VLR PLMN/PSTN MS ME SIM Air Interface signed response ciphering key 3 2 BTS 1 challenge BSC =? RAND SRES Kc A3 A8 3 HLR/AuC Ki Ki A8 A3 Authentication triplets generated in AuC and collected in MSC: RAND SRES Kc random number, signed response, ciphering key Ki ME MS SIM Individual secret Key Mobile Equipment Mobile Station = ME+SIM Subscriber Identity Module Challenge/response authentication from MSC to SIM Enter ciphering mode without transmitting Kc on the air Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 5
6 Transport encryption in WAP WAP gateway Web server WAP browser mobile network WTLS Internet SSL Main risks handled: eavesdropping on the air and in the Internet Internet and Mobile Network encrypted WTLS: network-independent technology Operates on GSM, CDMA, GPRS, Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 6
7 UMTS network Node B RNC 3G MSC/VLR Circuit Core Network 3G SGSN 3G GGSN UICC: USIM,... Node B IP intranet IP Network MSC RNC SGSN GGSN UICC USIM circuit traffic packet traffic Mobile Switching Center Radio Network Controller Serving GPRS Support Node Gateway GPRS Support Node UMTS Integrated Circuit Card User Service Identity Module Improved network security New interfaces to be secured: Internet and Multimedia Services Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 7
8 Security Concepts in UMTS Compatibility with GSM security features and network Address the security weaknesses of GSM: access security only: security between mobile and switch, i.e. microwave links now encrypted subscriber authentication only: mutual authentication of subscriber and network vulnerable for active attacks: encrypted signaling messages short keys: increased key length clear transmission of cipher keys and authentication values within and between networks in case of roaming: session keys for roaming (transport security) lack of confidence in cryptographic algorithms: well-studied open algorithms Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 8
9 Mobile Network Summary GSM - GSM + plain text transmitted in the network subscriber authentic. encrypted air interface no end-to-end WAP security full transport layer encr. WAP choice of algorithms, no end-to-end security elliptic curve cryptogr. efficient for mobiles plain text in WAP UMTS gateway network authentication UMTS exposed to attacks from the Internet data privacy problem in location based services Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 9 protected access network encrypted messages increased key lengths secure interface between networks
10 Mobile Applications Security Concepts in Mobile Networks Applications in Mobile Networks Application in the Terminal: WAP or SAT Application in PDA or Notebook Mobile Terminal used for Network Access Security Requirements Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 10
11 Applications in the terminal SMS, USSD GSM SAT: SIM Application Toolkit Mobile is used as a primitive I/O-terminal Interface between mobile and SIM standardized, i.e. independent from mobile equipment Communication uses SMS or USSD for transport Applications are specific for the card used, programming by experts only Applications limited in size by card memory and performance SAT browser incl. security plug-ins instead of WAP Mature technology, widely supported by terminals Slow transmission: mainly for small messages SMS USSD Short Message Service Unstructured Supplementary Service Data Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 11
12 Applications in the terminal SMS, USSD JavaCard SMS USSD GSM Short Message Service Unstructured Supplementary Service Data Mobile terminal is an Internet access terminal which can be used for phone calls in special cases, Mobile is used as a primitive I/O-terminal Performance of Smart Cards rapidly increasing In addition to the SIM application, e.g. Java Interpreter and (remotely) loaded Java applets can execute in the Smart Card User interactive applications run on the Card Functionality of the mobile terminal can be controlled by the Smart Card Payload in a SMS is sent to the Smart Card without user intervention Serious security issues to be solved (signed applets, verification of arriving applets ) Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 12
13 Network Access Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used for Network Access Security Requirements Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 13
14 Mobile Terminal used as Network Access Ca. 500 Mio. GSM terminals in use world-wide can be always online, i.e. 3 times more than Internet hosts Network access from PDA or Notebook via mobile terminal using cable, Infrared, Bluetooth, ad-hoc-networks Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 14
15 Mobile Terminal used as Network Access Bluetooth: local wireless connection to devices, speed: up and down 433 kbits/s each or up 58 kbits/s and down 721 kbits/s, 8 devices, multipoint Bluetooth security symmetric payload encryption (8 128 bits key length) optional authorization (permission to use services) challenge-response authentication to check that both sides of a pair of devices use the same encryption key frequency hopping Bluetooth provides basic security for simple networks needs application level support and end-to-end security for serious, security sensitive work Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 15
16 Mobile Terminal used as Network Access IrDA: point-to-point ad-hoc transmissions for up to ca. 1m with at up to 4 Mbits/s (16 Mbits/s under development) requires optical visibility uses the same upper layer protocol as Bluetooth for point-and-shoot style of operation in a narrow angle (ca. 30 ), easy choice of recipient IrDa security: no link layer security relies on application level security security mechanisms Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 16
17 Mobile Equipment used as Network Access Wireless LAN (IEEE b) security frequency hopping; access control lists data security: Wired Equivalent Privacy (WEP) encrypts data, but leaves the headers intact, weak algorithm 40 bits RC4, shared key; this is not an end-to-end privacy challenge-response authentication no access barriers inside the network defined shares the same vulnerabilities with wired LAN (Internet access, sniffing, ) plus vulnerability for jamming (Denial of Service attack) Internet requires careful handling of security issues on upper layers Access Point Intranet Appli. Server Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 17
18 Ad-hoc networks Ad-hoc networks: mutual communication among wireless clients no network structure Ad-hoc network security: Authenticity to be implemented by signed certificates Access control lists sophisticated key agreement necessary to defend eavesdropping during the key agreement phase (secure authentication and encryption) Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 18
19 Security Requirements Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used for Network Access Security Requirements Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 19
20 Security Requirements Challenge Security threats for the Mobile Office are not new, but PDAs, WAP, Bluetooth present unique and urgent security challenges when connected to critical/sensitive enterprise systems or used for commercial transactions how to guarantee secure host access and secure transactions from mobile terminals using a variety of protocols? Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 20
21 Security Requirements for the Mobile Office Mandatory security requirements confidentiality cryptography authentication certificates integrity signatures non-repudiation signatures+certificates easy and strong user authentication explicit transaction authorization end-to-end encryption accepted log-on security (biometrics ) instead of several PINs, passwords, etc. intrusion detection and audit-trail Define a security policy that states the rules for access and plan mechanisms and countermeasures Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 21
22 Summary Standard challenges of e-commerce Denial-of-Service attacks virus code modification, replay, etc. in gateway systems Additional challenges for m-commerce easy eavesdropping on air interface Denial-of-Service attacks : jamming limited performance of mobile devices in terms of memory and throughput means limited cryptographic performance variety of protocols to be supported high risk that mobile equipment is stolen or lost, i.e. user authentication is critical and the shared secret should not be compromised in that case Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 22
23 Summary Authentication and end-to-end encryption crucial Problem of secure key handling to be solved without complicating the handling Networks provide at best basic security; PKI (Public Key Infrastructure) required for commercial use and for access to sensitive data: cryptography, digital signatures, digital certificates: under defin. by Radicchio, Msign, GMCIG, Met,... SIM+SIM Application Toolkit, Java Card or UICC with security applications can host security software in a mobile terminal; smart card and cryptographic software to be used in a PDA or notebook Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 23
24 Recommendations build security in from the beginning build a complete security solution incl. intrusion detection, anti-virus scanners (content), firewalls, access control, logging, handle gateways (e.g. WAP gateway) as if they were application servers fully support wireless networks by central IT or outsource the construction of a secure infrastructure to avoid creation of distributed less secure networks monitor security regularly (operate and maintain (!) intrusion detection, process access logs, ) and prepare to react Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 24
25 Alcatel s role Alcatel is a network manufacturer covering the complete range of products Alcatel offers consulting services Alcatel is a partner in cooperations e.g. with KeySoft for mobile-based Extranet access solutions based on the MOBEX product: mobile access to mail, files, calendar, secured applications, etc. Gemplus to guarantee the compatibility of the USIM smart card with the UMTS network Certicom, RSA et al. for security technology used in mobile, VPN and PABX solutions Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 25
26 contact: Alcatel SEL AG, S. Rupp Mobile Office - Anforderungen an die Sicherheit 26
Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 10 Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography Wilayat Khan 1 and Habib Ullah 2 1 Department of Electrical
How To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.
Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke [email protected] Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003
UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
Mobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
Security and Authentication Concepts
Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy
PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
How to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
International Journal of Computing and Business Research (IJCBR)
AN INVESTIGATION OF GSM ARCHITECTURE AND OVERLAYING WITH EFFICIENT SECURITY PROTOCOL Karun Madan, Surya World Institute of Engg. & Technology, Rajpura, Punjab ABSTRACT The Global System for Mobile Communications
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Fundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities
Radboud University Nijmegen Bachelor Thesis Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities Author: Lars Lockefeer Supervisors: Engelbert Hubbers Roel Verdult
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
Mobile Phone Security. Hoang Vo Billy Ngo
Mobile Phone Security Hoang Vo Billy Ngo Table of Content 1. Introduction Page 2 1.1 Analog Network Page 2 1.2 Digital Network Page 2 2. Security Protocols Page 4 2.1 Analog Page 4 2.2 Digital Page 5 3.
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Packet Level Authentication Overview
Packet Level Authentication Overview Dmitrij Lagutin, [email protected] Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction
Key Management (Distribution and Certification) (1)
Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
2G/3G Mobile Communication Systems
2G/3G Mobile Communication Systems Winter 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline 2G Review: GSM Services Architecture Protocols Call setup Mobility management
GSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Chapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
The GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
NAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS SHORT MESSAGE SERVICE (SMS) SECURITY SOLUTION FOR MOBILE DEVICES by Yu Loon Ng December 2006 Thesis Advisor: Co-Advisor: Gurminder Singh John Gibson
Security Requirements for Wireless Networking
Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END
Wireless Security: Token, WEP, Cellular
Wireless Security: Token, WEP, Cellular 27 May 2015 Lecture 9 Some slides adapted from Jean-Pierre Seifert (TU Berlin) 27 May 2015 SE 425: Communication and Information Security 1 Topics for Today Security
Global System for Mobile Communications (GSM)
Global System for Mobile Communications (GSM) Nguyen Thi Mai Trang LIP6/PHARE [email protected] UPMC/PUF - M2 Networks - PTEL 1 Outline Principles of cellular networks GSM architecture Security
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
Mobile Services (ST 2010)
Mobile Services (ST 2010) Chapter 2: Mobile Networks Axel Küpper Service-centric Networking Deutsche Telekom Laboratories, TU Berlin 1 Mobile Services Summer Term 2010 2 Mobile Networks 2.1 Infrastructure
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What
White Paper. Bearer Independent Protocol (BIP)
White Paper Bearer Independent Protocol (BIP) - 2 - Contents 1 Executive summary...4 2 Introduction...5 3 Solution description...5 3.1 Standards compliance...5 3.2 Interface architecture...6 3.3 Data carriers...9
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National
LTE Overview October 6, 2011
LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
m-trilogix White Paper on Security in Wireless Networks
m-trilogix White Paper on Security in Wireless Networks Executive Summary Wireless local area networks (WLANs) based on IEEE 802.11b (Wi-Fi) will ship, according to a Cahners- Instat study, 23.6 million
GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010
Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Dennis Wehrle, Konrad Meier, Dirk von Suchodoletz, Klaus Rechert, Gerhard Schneider Overview 1. GSM Infrastructure
TETRA Security for Poland
TETRA ASSOCIATION TETRA Security for Poland Brian Murgatroyd TETRA ASSOCIATION former Chairman Security and Fraud Prevention Group Warren Systems (SFPG) Independent Security Consultant [email protected]
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering
Handoff in GSM/GPRS Cellular Systems Avi Freedman Hexagon System Engineering Outline GSM and GSM referemce model GPRS basics Handoffs GSM GPRS Location and Mobility Management Re-selection and routing
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek
Mobile Security Practical attacks using cheap equipment Presented the 07/06/2016 Business France By Sébastien Dudek For Content Security measures Recent publications in the hacking community Practical
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu
Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu Market GSM Overview Services Sub-systems Components Prof. Dr.-Ing. Jochen
GPRS Network Security
AT&T Wireless Services, Inc. GPRS Network Security Document Number 12199 Revision 0.4.5 Peter Rysavy, Primary Contributing Writer Product Development AT&T Wireless Services, Inc. PO Box 97061 Redmond,
Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
A Systemfor Scanning Traffic Detection in 3G WCDMA Network
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
Configuring connection settings
Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013
City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks MBS-W07 Selim Aissi, PhD Objectives Mobile Security Threat Landscape Mobile Network Security Cybersecurity Implications, Mitigations
Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures
Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures (IEEE 802.11 Wireless Networks) James Burrell Research project submission for the partial fulfillment of the requirements for
Common Remote Service Platform (crsp) Security Concept
Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
Wireless Local Area. Network Security
Wireless Local Area Network Security HONORS PROJECT CIS 345/ Section 131 Spring 2005 Mentor: Prof. C.S. Rani The first part of this research paper will answer questions such as: what is wireless, how wireless
!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' Giuseppe Bianchi
!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' "#$!!% "&'! #&'!%! () *+,, 3 & 5 &,! #-!*! ' & '.! #%!* //!! & (0)/!&/, 6 5 /, "! First system: NMT-450 (Nordic Mobile Telephone)
Nokia E61i Configuring connection settings
Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or
