Tuesday, January 8, 2019
3G network based security threats Essay
The tell apart threats for 3G engagements in perspective of consolidation of networks are Wireless LAN customer who does not have access to 3G networks excite access to 3G services without subscription. wireless fidelity exploiter constructs access to 3G network and creates issues such(prenominal) as Denial of Service wireless fidelity drug drug user gains access to 3G network and uses impersonation for employ the service but charging other customers. enjoyment of charging when services like calls are transferred from integrity network to another. Application and info cerebrate threats.Collection of login dilate and personal details that are transmitted over the network by using sniffing tools and mechanisms, e limitedly when qualified transport hostage is not set. utilization of information used for user enfranchisement or service access to gain access to unauthorised services or manipulation of billing. Extracts personal information that are used at other places such as credit card information. check information about user such as permanent identity in the network.Virus attacks from WLAN devices to other devices in the network Trojans and malicious software passed from ane end-device to another. For volume based charging model, a rapscallion partner nates flood the user with garbage packets to outgrowth the invoiced amount. Malicious programs on the user remainder that increases the traffic to original sites or content to illegally increase the traffic. Security Considerations for 3G-WLAN Integrated Networks. The security measures fashion model for 3G-WLAN integrated networks consists of various layers.Each security layer is independent of the other layers. However, at that place necessitate to be an overall security scheme that connects all the security requirements together. alike, since roughly of the vulnerabilities can happen at aggregate layers, a holistic approach and good example is indispensable to address all the risks of the special network. Authentication security at the user terminal. The hallmark scheme in the fortune of 3G-WLAN should be based on a challenge response protocol homogeneous to the existing active communication documentation scheme.This requires that the authentication details in the user terminal to be stored securely on UICC or SIM card. This should support mutual authentication and security mechanisms such EAP. Signalling and User Data Security. The subscriber needs to have the equal level of security as the mobile access that is specified for the 3G networks. This means that the WLAN authentication and re-authentication mechanisms must be at the same levels as for 3G USIM based access.It needs to support the maintaining session key deterrent and maintenance. Also the 3G systems should provide the required keys with enough length and levels of entropy that are required by the WLAN subsystem. WLAN key agreement, distribution and authentication mechanism shoul d be secure against any attacks by middlemen. The WLAN access technology among the user equipment and the access point/ network should be able to utilise the generated session keying strong to ensure the integrity of the connection for authentication. seclusion of User Identity. The keys used by 3G abdominal aortic aneurysm function that are used for the genesis of temporary identities that is used for the communication between the network element and the user terminal should not be contingent to recover. If it is possible to retrieve the keys, the permanent identity can be derived from any of the temporary identities. Also it should be possible to mask the antithetical temporary identities corresponding to the permanent identity.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment