Recent Changes - Search:


Admin & Tools

Mobile Networking

edit SideBar

UniK, Kjeller


Place: Audatorium, UniK

Time: Wednesday & Thursday 13-16; Friday 9-12

Week: 4, 5, 9, 11, and 13

Book: William Stallings: Cryptography and Network Security, Prentice Hall. 4th ed .

Report draft

Proposed Title: Study on the Security of Mobile Communication Systems

Abstract Introduction of Mobile communication systems provides the desired connectivity to the people almost everywhere, even on the movve. Initially, it was intended for voice communication. Now-a-days fixed and fixed wireless networks are not the only means to access diverse services in the digital world. Increasing data communication capability of third generation and emerging next-generation mobile networks is expected to enable real-time and seamless user experience in service interaction scenarios. Within some scenarios, sensitive user information transmission over the air demands strict security measures. Maintaining such system secure is more challenging than that of the fixed system. The objective of this report is to discuss security requirements, security mechanisms, and drawbacks of previous and current mobile communication systems. First generation analogue mobile systems were susceptible to serious abuses. Though GSM security features address most drawbacks of its predecessor and introduce some new features, still it has some weaknesses. UMTS improves the security mechanism further. The report deals with both access network security and core network security part of mobile communication systems.

Table of Contents

- Problem of broadcast transmission channel

- Gsm - algorithms, flaws,

- security issues

- Umts - difference between UTMS and GSM, weaknesses, possible integration with encryption protocols from the computer domain

- Also computational cost, energy constrains

- Internet access through mobile

Edit - History - Print - Recent Changes - Search
Page last modified on February 06, 2007, at 01:21 PM EST