Security In Wireless Cellular Networks
Ali I. Gardezi, ali@aligardezi.com
Abstract:
Cellular Communication has become an important part of our daily life.
Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary
transactions, send text messages etc. using our cell phones, and new services continue to be added. Therefore,
it is important to provide users with a secure channel for communication. This survey paper will give a brief
introduction to the various generations of cellular networks. For those not familiar with the cellular network
architecture, a brief description of the new 3G cellular network architecture will be provided. Limitations of
cellular networks, their security issues and the different types of attacks will be discussed. Then the steps taken
in the new 3G networks to combat the different security threats will be provided. Also, the security features of the
Wireless Application Protocol (WAP) used to access the Internet will be discussed. The paper will go over some
new security mechanisms that have been proposed by researchers.
Table Of Contents:
- 1. Introduction
- 2. Generations Of Cellular Networks
- 2.1. 2G and 2.5G
- 2.2. 3G
- 2.3. 3G - UMTS Architecture
- 3. Security Issues
- 3.1. Limitations Of Cellular Networks
- 3.2. Security Issues In Cellular Networks
- 3.3. Types Of Attacks
- 4. Security Mechanisms In 3G - UMTS
- 4.1. 3G Security Architecture
- 4.2. Wireless Application Protocol (WAP)
- 5. Future
- 5.1. Additional Security Mechanisms
- 5.2. A Look At Security In 4G
- Summary
- References
- List Of Acronyms
View The Complete Report Online
Right-Click To Download The Report In Adobe Acrobat Format (245,760 Bytes)
Back to Raj Jain's Home Page