7696081218

7696081218



Security Architecture in UMTS Third Generation Cellular Networks

Tomas Balderas-Contreras Rene A. Cumplido-Parra

Coordinación de Ciencias Computacłonales, Instituto Nacional de Astrofisica, Optica y Electrónica, Luis Enriąue Erro 1, Sta. Ma. Tonantzintla, 72840, Puebla, MEXICO balderas@inaoep .mx rcumplido@inaoep. mx

Abstract Throughout the last years there has been a great interest in developing and standardizing the technologies needed to achieve high speed transmission of data in cellular networks. As a result, mobile Communications technology has evolved amaz-ingly during the last decades to meet a very demanding market. Third generation (3G) wireless networks represent the morę recent stage in this evolutionary process; they provide users with high transmission bandwidths which allow them to transmit both audio and video information in a secure manner. This report concerns a specific imple-mentation of the 3G reąuirement specification: Universal Mobile Telecommunications System (UMTS), which is considered to be the most important of the 3G proposals. In order to protect the information transmitted through the radio interface, either user data or signaling data, an advanced security scheme was conceived. Among the features of this scheme are: mutual authentication, key agreement, błock ciphering, an integrity algorithm and a confidentiality algorithm.

Keywords: Cellular Networks, 3G, UMTS, Security Architecture, AKA, KASUMI błock ciphering algorithm, confidentiality and integrity algorithms.

1 Introduction

A cellular communication system is a special kind of wireless system whose features are the follow-

ing:

Freąuency reuse: The whole coverage area is divided into several smaller areas, called cells, in such a way that some transmission freąuencies are used across a set of cells, and reused for another set of cells with little potential for interference.

Mobility/Roaming: Subscribers are able to move freely around their home network and from this to another one. This feature reąuires that the network tracks the location of each subscriber in an accurate way, in order to deliver calls and messages properly.

Handoff/Handover: The subscriber transitions from one radio channel to another as he/she moves from one celi to another while engaged in a conversation.

1



Wyszukiwarka

Podobne podstrony:
Security Architecture in UMTS Third Generation Cellular Networks Tomas Balderas-Contreras Rene A.
Figurę 4: Basic architecture of a UMTS mobile network (Release 99) (from [11]). be reached. Figurę 5
Architecture Art Nouveau architecture in Riga makes up roughly one third of all buildings in the cen
le cnamGSM -    Early 1980 s, several cellular networks in Europę -    
(a) PDC (b) FOMA Figurę 1: Subscriber growth ratę of the second generation and third generation serv
IN 1 IN Areas, Limits General Dredged and Swept Areas —>11    Submarine Cables, Su
KARTY DO GRY Architektura w SzczeciniePLAYING CARDS Architecture in Szczecin KARTY DO GRY Architektu
130 Agata Borowska-Pietrzak surveys can sensitize the area of HRM to changes in employee preferences
screenshot 8 WordGoogle Maps in ThickBoxJust anothHOME General James Wolfe
General Security Issues This section describes generał security issues to be aware of and what you c
104 105 104 OTHER IMPORTANT FACTORS IN WRITINGThe Third Stage: An Initial Draft Working in an apple
Zeszyty Problemowe - Maszyny Elektryczne Nr 86/2010 in eveiy subseąuent generatioa On completing cal

więcej podobnych podstron