7696081211

7696081211



User Application


Provider Application


~r


Application stratum


1

USIM

4-►

HE


Home

stratum/

Serving

Stratum



Transport

stratum

Figurę 6: Overview of the security architecture (from [3]).

3.1 Network access security features

Network access security features can be further classified into the following categories: entity au-

thentication, confidentiality and data integrity. The following is a description of the security features

classified into the category of entity authentication:

User authentication: The property that the network that provides the service (serving network) corroborates the identity of the user.

Network authentication: The property that the user corroborates that he is connected to a serving network that is authorized by the user’s home network to provide him services; this includes the guarantee that this authorization is recent.

The following security features deal with the confidentiality of data on the network access link:

Cipher algorithm agreement: The property that the mobile station and the serving network can securely negotiate the algorithm that they shall use subseąuently.

Cipher key agreement: The property that the mobile station and the serving network agree on a cipher key that they may use subseąuently.

Confidentiality of user data: The property that user data can not be overheard on the radio interface.

Confidentiality of signaling data: The property that signaling data can not be overheard on the radio interface.

The features provided to achieve integrity of data on the network access link are the following:

Integrity algorithm agreement: The property that the mobile station and the serving network can securely negotiate the integrity algorithm that they shall use subseąuently.

12



Wyszukiwarka

Podobne podstrony:
This command tag number/character string can be defined by user applicatian program. The return mess
About User Privileges and Roles User privileges provide a basie level of database security. Thcy arc
This provides space for the application of AHP method that offers the possibility of pairwise compar
Obraz0009 (2) I Identify the following excerpts (provide tlie title, the nanie of the author - when
41844 Obraz0009 (2) I Identify the following excerpts (provide tlie title, the nanie of the author -
Obraz0003 (3) I Identify the following excerpts (provide the title, the name of the author - when ap
Model Navigator NewModel Libr ary
New Model Library
Obraz0003 (3) I Identify the following excerpts (provide the title, the name of the author - when ap
Obraz0009 (2) I Identify the following excerpts (provide tlie title, the nanie of the author - when
57 (193) J434RE-30 -3- lOO0"* standard application of all ethics tools is thc answer for anyone
5 (937) Application Parameters
2 (1100) Application MD5 MesidgeDkjesl Irom Provide»C M essag eO łgest^e tlns tance TMD5 .
7 (780) Application Parameters
4 (1074) Application Parameters
NewModel Libr ary
HyperTerminal Telnet Client HyperTerminal is a generał-purpose Windows application that provides a W
ORIG1715 L Blanket Client Application (* jUse currenł user identit^ C Use this

więcej podobnych podstron