Preview

3g Mobile Network Architecture & Security Features Amit Kumar Saini Research Scholar Dr. Deepak Tyagi, Singhania University

Best Essays
Open Document
Open Document
2285 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
3g Mobile Network Architecture & Security Features Amit Kumar Saini Research Scholar Dr. Deepak Tyagi, Singhania University
Amit Kumar Saini Research Scholar
Dr. Deepak Tyagi,
Singhania University

3G Mobile Network Architecture & Security Features

1. Abstract

The aim of the research was to study the 3G (third generation) wireless networks architecture and its security features. From the data gathered through observations and literature review, security feature that are available in 3G networks were identified and methods that may be used to maximize the security in networks were determined. Recommendations are given to improve the security 3G networks.

2. Introduction

3G or 3rd generation is technology for mobile network is based on the IMT-2000 standards according to specification by International Telecommunication Union(ITU). It helps users in getting greater network capacity Through improved spectrum efficiency like video calls, broadband wireless data, music downloads, receiving streaming video from the Web, sending and receiving faxes, instantly downloading e-mail messages with attachments etc. 3G networks have potential transfer speeds of up to 3 Mbps (it takes around 15 seconds to download a 3-minute MP3 song). And if we compare the fastest 2G phone which can achieve up to 144Kbps(i.e. It takes around 8 minutes to download a 3-minute song) 3G speed much faster than it.
They are intended to provide a global mobility. In 1998 Third Generation Partnership Project (3GPP) was formed for the technical specification work.

3. UMTS network elements and interfaces

The core network is divided logically into two domains circuit-switched (CS) and packet-switched (PS). The CS domains work is to handle circuit-switched connections, and the PS domains work is to handle the packet transfer. The core network of CS is built around Mobile Switching Centers (MSC) and the core network of PS around Serving GPRS Support Nodes (SGSN). The various registers of core network are common in both the domains. But Visitor Location Register (VLR) is typically employed by CS domain only.



References: 9. Hacker Penetrates T-Mobile Systems, SecurityFocus Online, January 11, 2005 (http://www.securityfocus.com/news/10271) 10 11. Mobile Malware Evolution: An Overview, Part 2, Kaspersky Labs, October 10, 2006, Alexander Gostev, Senior Virus Analyst.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 7 Lab 7.1

    • 391 Words
    • 3 Pages

    the widely used WCDMA (UMTS) based 3G networks with higher speeds for the end user that are comparable to the newer LTE networks…

    • 391 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Technological: In the past three decades, a major shift in technology has prevailed in the mobile handset industry. Through innovation and technological advances, the market shifted from analog transmissions (1G), to digital mobile communications in 1992 (also known as 2G), and ultimately to the Wideband Data Communications network (3G). With rapid changes in this dynamic marketplace only the most well-funded and well-managed companies have managed to emerge from generation to generation, whilst others have been unsuccessful.…

    • 1566 Words
    • 6 Pages
    Good Essays
  • Best Essays

    Wireless Technology Upgrade

    • 3174 Words
    • 13 Pages

    In this project you will be introduced to an up and coming wireless service provider, GoFone Cellular Communications. GoFone is currently interested in making your nation our new home. GoFone has the ability to offer services that will allow its subscribers the ability to communicate faster and more efficiently. At the present the citizens within the 16 cities nation, only has one cellular provider that is offering subpar service. GoFone’s network is built off of Universal Mobile Telecommunications Service, (UMTS), technology which, promises to be a better choice for the Nation.…

    • 3174 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    Smart Phones

    • 296 Words
    • 2 Pages

    2g compared to a typical 3g speed is a huge difference. 2G transfers at 10 kbps and 3g can transfer at speeds between 300 and 500 kbps. This allows 3g to have web access as compared to 2g as well as high quality photos, and low quality video.…

    • 296 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It is clear that 3G technology is playing a vital role in the development of Afghanistan; the Roshan Company has introduced the M-paisa mobile money service to Afghanistan which is a successful telecom development company in…

    • 803 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Understanding the risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. Maintaining secure wireless network is an ongoing process that requires greater effort that the required for other networks and systems. By assessing the risks, testing and evaluating system security controls for wireless networks more frequent can help prevent problems. There are many ways to improve the management of wireless or mobile technology like the following:…

    • 610 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Malware has become an increasing security threat. It is not only a security threat for mobile devices but for PCs also. Those persons responsible for developing and publishing malicious code and websites are getting more and more creative with hiding their criminal activities. Cybercriminals have been studying and researching new ways to hide their identities to avoid being captured and prosecuted. They are utilizing cryptography more and they are placing their servers in closed, anonymous spaces within the World Wide Web to avoid surveillance.…

    • 1136 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Posey, Brien. 2005. Have Wireless Networks Surpassed the Security of Wired Networks? Windows Security - http://www.windowsecurity.com. [Online] March 22, 2005. [Cited: September 26, 2007.] Brien Posey is an MCSE and has won the Microsoft MVP award for the last two years. Brien has written who over 3,000 technical articles and written or contributed material to 27 books. http://www.windowsecurity.com/Brien_Posey/…

    • 1357 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Enterprise WLAN Market Analysis - Cisco offer 2014 Students Professor Contents 1. Motivation ................................................................................................................................ 3 2. The new Standard – IEEE 802.11ac ........................................................................................ 3 2.1 How Does 802.11ac Go So Fast? .....................................................................................…

    • 4169 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    In the field of computing, few inventions, innovations or technological improvements, have been moving quite like wireless technology. With the advent of fourth generation cell phones and networks (4G), there have literally been leaps and bounds made in the realm of personal computing, productivity and data sharing. It is this increased connectivity both in our personal and business lives that introduce risks to intrusion, corruption or theft of data, or in the worst case, access to personal data that would lead to identity theft. In the business realm, this translates to problems for firm infrastructure and exposure to proprietary leaks, loss of customer data, or damage to the reputation of the business entity. Therefore, it is important that adequate measures are taken to evaluate risks and take steps both personally and professionally to minimize those risks. We present several advantages and disadvantages of the Android OS platform with very high visibility right now in the wireless arena. Both for the flexibility and open architecture, this platform presents some unique challenges in terms of security.…

    • 2941 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    Abstract— The increasing demand for broadband services is causing the cellular network providers to consider for the integration of Wireless LAN with GPRS. WLAN is having higher data rate but low coverage area but GPRS is having lower data rate but with high coverage area. So integrating these two heterogeneous networks will lead to utilization of advantages of both and can increase the system throughput. The handoff latency is reduced by considering the threshold values of both the networks and anticipating the handoff well before. Especially the packet loss is completely eradicated by multicasting the packets during the handoff period and switch back to normal mode after the handoff. Hence the system throughput obviously increase by certain amount by our procedure of multicasting.…

    • 4247 Words
    • 17 Pages
    Powerful Essays
  • Best Essays

    As the development of mobile devices such as smartphones or tablets, the demand of data traffic is increasing rapidly. It also changes the mobile network, which has mainly provided voice service traditionally, to be more data-oriented. The mobile data traffic growth rate will maintain in 50% approximately each year, which is forecasted by Cisco [1]. The capability of existing 3G systems cannot satisfy the requirements of data traffic growth, even they has improved a lot in data service from 2G.…

    • 3388 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    [3] 3GPP. Security aspects of early IP multimedia subsystem (IMS) (release 7). Technical Report TS 33.978 V7.0.0, June 2007.…

    • 3020 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Study Seminar

    • 2785 Words
    • 12 Pages

    Mobile communication has been readily available for several years, and is major business today. It provides a valuable service to its users who are willing to pay a considerable premium over a fixed line phone, to be able to walk and talk freely. Because of its usefulness and the money involved in the business, it is subject to fraud. Unfortunately, the advance of security standards has not kept pace with the dissemination of mobile communication.…

    • 2785 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Rap Regarding Obu

    • 885 Words
    • 4 Pages

    seriously dont get the fuss behind 3G i mean corruption and all to hell with all, world has gone far ahead than 3G and still we are stuck.…

    • 885 Words
    • 4 Pages
    Powerful Essays

Related Topics