Dr. Deepak Tyagi,
Singhania University
3G Mobile Network Architecture & Security Features
1. Abstract
The aim of the research was to study the 3G (third generation) wireless networks architecture and its security features. From the data gathered through observations and literature review, security feature that are available in 3G networks were identified and methods that may be used to maximize the security in networks were determined. Recommendations are given to improve the security 3G networks.
2. Introduction
3G or 3rd generation is technology for mobile network is based on the IMT-2000 standards according to specification by International Telecommunication Union(ITU). It helps users in getting greater network capacity Through improved spectrum efficiency like video calls, broadband wireless data, music downloads, receiving streaming video from the Web, sending and receiving faxes, instantly downloading e-mail messages with attachments etc. 3G networks have potential transfer speeds of up to 3 Mbps (it takes around 15 seconds to download a 3-minute MP3 song). And if we compare the fastest 2G phone which can achieve up to 144Kbps(i.e. It takes around 8 minutes to download a 3-minute song) 3G speed much faster than it.
They are intended to provide a global mobility. In 1998 Third Generation Partnership Project (3GPP) was formed for the technical specification work.
3. UMTS network elements and interfaces
The core network is divided logically into two domains circuit-switched (CS) and packet-switched (PS). The CS domains work is to handle circuit-switched connections, and the PS domains work is to handle the packet transfer. The core network of CS is built around Mobile Switching Centers (MSC) and the core network of PS around Serving GPRS Support Nodes (SGSN). The various registers of core network are common in both the domains. But Visitor Location Register (VLR) is typically employed by CS domain only.
References: 9. Hacker Penetrates T-Mobile Systems, SecurityFocus Online, January 11, 2005 (http://www.securityfocus.com/news/10271) 10 11. Mobile Malware Evolution: An Overview, Part 2, Kaspersky Labs, October 10, 2006, Alexander Gostev, Senior Virus Analyst.