Wednesday, July 17, 2019

3G network based security threats Essay

The key threats for 3G networks in perspective of integrating of networks are Wireless LAN customer who does not have devil to 3G networks get access to 3G run without subscription. wireless local area network drug drug substance abuser throws access to 3G network and creates issues much(prenominal) as Denial of Service WLAN user gains access to 3G network and uses impersonation for using the returns but charging other customers. Manipulation of charging when services alike c solelys are transferred from one network to another. Application and info related threats.Collection of login expand and personal details that are transmitted over the network by using sniffing tools and mechanisms, especially when sufficient transport warrantor is not set. Manipulation of information utilize for user earmark or service access to gain access to unauthorised services or use of billing. Extracts personal information that are used at other places such as credit bank note informat ion. Obtain information about user such as eonian identity in the network.computer virus attacks from WLAN devices to other devices in the network Trojans and leering software passed from one end-device to another. For volume based charging model, a rogue partner can flood the user with garbage packets to increase the invoiced amount. Malicious programs on the user terminal that increases the traffic to certain sites or confine to illegally increase the traffic. Security Considerations for 3G-WLAN Integrated Networks. The aegis example for 3G-WLAN integrated networks consists of various layers.Each security layer is independent of the other layers. However, there require to be an overall security intention that connects all the security requirements together. too, since some of the vulnerabilities can happen at multiple layers, a holistic approach and framework is required to address all the risks of the special network. hallmark security at the user terminal. The authenti cation scheme in the case of 3G-WLAN should be based on a challenge response protocol corresponding to the existing mobile communication authentication scheme.This requires that the authentication details in the user terminal to be stored securely on UICC or SIM card. This should support rough-cut authentication and security mechanisms such EAP. Signalling and User selective information Security. The subscriber call for to have the same aim of security as the mobile access that is specify for the 3G networks. This means that the WLAN authentication and re-authentication mechanisms must be at the same levels as for 3G USIM based access.It needs to support the maintaining academic session key verification and maintenance. Also the 3G systems should provide the required keys with sufficient length and levels of info that are required by the WLAN subsystem. WLAN key agreement, distribution and authentication mechanism should be secure against any attacks by middlemen. The WLAN ac cess technology between the user equipment and the access battery-acid/ network should be able to utilise the generated session keying material to ensure the integrity of the connection for authentication. concealment of User Identity. The keys used by 3G AAA component part that are used for the generation of temporary identities that is used for the communication between the network element and the user terminal should not be doable to recover. If it is doable to retrieve the keys, the permanent identity can be derived from any of the temporary identities. Also it should be possible to mask the different temporary identities corresponding to the permanent identity.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.