tailieunhanh - Security InWireless Cellular Networks

Industries with identified critical infrastructures should have full and complete participation in the development of cybersecurity standards and best practices. Any standards should be performance-based rather than technology-based to ensure that they are not out-paced by the advancement of technology. Owners and operators know best how to protect their own systems, and it is nearly impossible for the speed of bureaucracy to keep pace with ever changing threats. | Security In Wireless Cellular Networks file X www-docs cse574-06 ftp cellular_security Security In Wireless Cellular Networks Ali I. Gardezi ali@ Abstract Cellular Communication has become an important part of our daily life. Besides using cell phones for voice communication we are now able to access the Internet conduct monetary transactions send text messages etc. using our cell phones and new services continue to be added. Therefore it is important to provide users with a secure channel for communication. This survey paper will give a brief introduction to the various generations of cellular networks. For those not familiar with the cellular network architecture a brief description of the new 3G cellular network architecture will be provided. Limitations of cellular networks their security issues and the different types of attacks will be discussed. Then the steps taken in the new 3G networks to combat the different security threats will be provided. Also the security features of the Wireless Application Protocol WAP used to access the Internet will be discussed. The paper will go over some new security mechanisms that have been proposed by researchers. Table Of Contents 1. Introduction 2. Generations Of Cellular Networks . 2G . 3G o . 3G - UMTS Architecture 3. Security Issues . Limitations Of Cellular Networks . Security Issues In Cellular Networks o . Types Of Attacks 4. Security Mechanisms In 3G - UMTS . 3G Security Architecture . Wireless Application Protocol WAP 5. Future o . Additional Security Mechanisms . A Look At Security In 4G Summary References List Of Acronyms 1. Introduction Cellular Communication has become an important part of our daily life. Besides using cell phones for voice communication we are now able to access the Internet conduct monetary transactions send text messages etc. using our cell phones and new services continue to be added. However the wireless medium has certain .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.