Preview

3g Security Threats Amit Kumar Saini Research Scholar Dr. Deepak Tyagi, Singhania University

Powerful Essays
Open Document
Open Document
3176 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
3g Security Threats Amit Kumar Saini Research Scholar Dr. Deepak Tyagi, Singhania University
Amit Kumar Saini Research Scholar
Dr. Deepak Tyagi,
Singhania University
3G Security Threats

1. Abstract

The aim of the research was to study the 3G (third generation) wireless networks security threats. From the data gathered through observations and literature review, security threats that may be possible in 3G mobile networks were identified and the methods which may be used to minimize such security threats in networks were determined. Recommendations are given to minimize the security threats 3G networks.

2. Introduction

3G or 3rd generation is technology for mobile network is based on the IMT-2000 standards according to specification by International Telecommunication Union (ITU). It helps users in getting greater network capacity through improved spectrum efficiency like video conference support, IPTV (TV through the internet), broadband wireless data, music downloads, receiving streaming video from the Web, sending and receiving faxes, instantly downloading e-mail messages with attachments etc. 3G networks have potential transfer speeds of up to 3 Mbps (it takes around 15 seconds to download a 3-minute MP3 song).
They are intended to provide a global mobility. In 1998 Third Generation Partnership Project (3GPP) was formed for the technical specification work. 3G is a set of technologies and standards that include W-CDMA, WLAN and cellular radio, among others. Figure below shows the UMTS network and its elements:

3. 3G Mobile network are more vulnerable now:

• IMSI is sent in clear-text when allocating TMSI to the user
• 3G mobile network is based on Internet Protocol (IP) which provide high speed wireless connection, allowing user to do more things while connected.
• Evolving of network with IMS, enable interconnected networks running on IP.
• A user can be lured to camp on a false BS. Once the user camps on the radio channels of a false BS, the user is out of reach of the paging signals of SN
• Hijacking outgoing/incoming



References: 9. Hacker Penetrates T-Mobile Systems, SecurityFocus Online, January 11, 2005 (http://www.securityfocus.com/news/10271) 10 11. Mobile Malware Evolution: An Overview, Part 2, Kaspersky Labs, October 10, 2006, Alexander Gostev, Senior Virus Analyst.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    II. Data: Commonly called mobile internet, data is sent over radio waves in 3G or 4G connections. The Data is streamed over the phone similar to the way the internet connects to a computer.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab 7.1

    • 391 Words
    • 3 Pages

    the widely used WCDMA (UMTS) based 3G networks with higher speeds for the end user that are comparable to the newer LTE networks…

    • 391 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2415 Words
    • 10 Pages

    A 4G system is expected to provide a communication technology based on Internet Protocol. Internet protocol or IP is generally used in the computer networks for data communication among computers. All the devices are identified by a number called IP number. In 4G network this concept is extended to telephony with an intention to make data and voice communication integrated in the same architecture. The 4G network is supposed to facilitate a Gigabit speed i.e. a speed of 100+ Mega Bytes per second with a mobile node speed of up to 200km/hr. It will enable Internet access, IP…

    • 2415 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Technological: In the past three decades, a major shift in technology has prevailed in the mobile handset industry. Through innovation and technological advances, the market shifted from analog transmissions (1G), to digital mobile communications in 1992 (also known as 2G), and ultimately to the Wideband Data Communications network (3G). With rapid changes in this dynamic marketplace only the most well-funded and well-managed companies have managed to emerge from generation to generation, whilst others have been unsuccessful.…

    • 1566 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    cis500 week1

    • 1738 Words
    • 6 Pages

    This paper will compare and contrast 3G wireless networks to 4G networks in terms of services and application, network architecture, data throughput and user perceptions, it will distinguish between the 4G LTE, 4G WiMax, and 4G WiBro networks based on upload and download speeds, user perceptions, backward compatibility, service availability. It will also identify why the competition between the 4G LTE carriers has been so fierce and will describe the benefits of this competition to the subscribers.…

    • 1738 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Wireless Technology Upgrade

    • 3174 Words
    • 13 Pages

    Since the introduction of the first mobile phone in 1924, there has been a steady climb in developing and enhancing, the mobile phone and its supporting technologies. The cellular network infrastructures as well as service providers have been hard at work; in making sure they are providing the best service as well as devices. The infrastructure alone has gone through several life cycles. Which is required in order providers to keep up with growth and technology changes. Wireless cellular providers, at one point offered services that ran off analog frequencies. Today the wireless networks are built off of an all-digital network, which is considered to be in its 3rd generation. 3rd generation technologies include GSM, GPRS, UMTS and CDMA.…

    • 3174 Words
    • 13 Pages
    Best Essays
  • Powerful Essays

    As shown in the table above, the services and applications used by 3G are CDMA 2000, UMTS, EDGE, and others. UMTS utilizes the FOMA, WCDMA and HSPA air interface technologies, and UMTS networks can co-exist with earlier 2.5G…

    • 2450 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    3G is a communications company focused on bringing the benefits of the internet to the mobile telephone. The 3G network is built for data and future-proofed for 4G technologies. The organisation has invested billions of pounds developing and expanding the network which means 3G can connect more people to the internet in more places, whilst increasing the capacity to meet the ever-growing demand for data.…

    • 1468 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5), 12-14.…

    • 781 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Milligan, P., & Hutcheson, D. (2008). Business risks and security assessment for mobile devices, Audit and Control Association. www.isaca.org…

    • 610 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    3G - is the wireless network standard in the 3G Phone. It is called 3G because it is third generation of cellular telecom standards. It is a faster network for phone and data transmission. 14.4Mbit download. 5.8 Mbit upload. This may not be true. It also depends on the location and the technology…

    • 2100 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Mobile Phone Industry

    • 2101 Words
    • 9 Pages

    The cellular phone industry has evolved over a period of 20 years, from first generation to third generation mobiles. The inventions by mobile industry incorporate:First Generation (1G) -The first generation mobile phone refers to the mobile phones that were developed in the 1980s. Second Generation (2G) -GSM, CDMA and TDMA are the different protocols that brought the mobile phone into the second generation stage. The 2G was introduced to the market basically in the early 1990s. Second And a Half Generation (2.5G) -Still under the same network protocol, but provided services such as WAP and GPRS enabling mobile phones to access on certain websites. Coloured screen with camera featured mobile phones were also introduced in this stage. Third Generation (3G) -A whole new network protocol launched in the twenty-first century. It is either under IMT-2000, UMTS or W-CDMA standards. The 3G protocol enables high speed connection (speed similar to broadband connection) to access through internet and also video calls.…

    • 2101 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Sowmya, M. (2011, September 22). Building Cstles in the Sky: Mobile Hacking and it 's Impact on CyberSecurity. Retrieved from Unisys: http://blogs.unisys.com/disruptiveittrends/2011/09/22/building-castles-in-the-sky-mobile-hacking-and-its-impact-on-cybersecurity/…

    • 1441 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Today is the day of internet. In most field wireless system is very widely used.Currently a number of technologies like1G,2G,2.5G,3G etc A new technology is introduced which is called as 4G technology.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Mobile Malware

    • 1047 Words
    • 3 Pages

    Mobile devices have changed the way we live, work and play yet the tricks that have been used by cyber criminals to install malware on our computers are now beginning to threaten our smart phones and other mobile devices. Malware is any type of hostile, intrusive, annoying software or program code that is designed to use a device without the owner’s consent. They can be grouped into several categories ranging from viruses, worms, Trojans, rootkits and botnets. Throughout this paper I will discuss the different types of malware more in detail, divulge the operating system that may be more vulnerable to malware, describe the stages of malware attacks and explain the practices to avoid malware on your mobile device.…

    • 1047 Words
    • 3 Pages
    Better Essays