Ebook

Loading

Security of Mobile Communications

Author
wolfern
Date
2013-12-28 19:11
Views
46683297
Wireless networking has witnessed a tremendous growth in recent years. Wireless networks offer attractive flexibility and coverage to network operators and users. Ubiquitous network coverage, for local and wide areas, can be provided without the cost of deploying and maintaining wired-based infrastructures. The current wireless networks are based on the concept of (radio) cells, which divide a telephone service zone into small areas for efficient use of low-power transmitters with minimum interference. The terminal devices are generally unintelligent terminals, meaning that the call management, routing, and other services are handled in the network. The terminals can move from one area to another, requiring their calls to remain uninterrupted during mobility. A simplified architecture of the wireless network is depicted in Figure 1.1. When a mobile terminal is turned on, it locates a nearby cell, which tells it what radio channels and what transmission power to use. As the terminal moves, it will repeat this process as it enters new cells. The mobile terminals identify themselves to the network using a unique identifier (ID), having two components that we denote, temporarily, by the electronic serial number (ESN) and the mobile identification number (MIN). While the first component physically identifies the terminal, the second identifies the terminal holder. The second component is actually the telephone number. The ESN and MIN are continuously validated by the network. A common attack on the communication systems, to obtain fraudulent services, is called cloning attack, in which the ESN and MIN are duplicated in another terminal and submitted to the system by the other terminal. To perform its tasks, a mobile communication system implements several fundamental functions, including call management, call billing, call routing, data communication, and data protection. For billing needs, the mobile communication system handling the communication connection is responsible for sending to the communication’s service provider a billing record, translating the raw connection details, according to rates and plans, into particular charges (for the MIN holder). The signal carriers, involved in the connection establishment, set up accounts with each other for the services provided on the other networks. End users typically pay a combination of monthly service charges and per-minute charges, although prepaid plans with only per-minute charges are becoming more popular.
The various wireless network technologies, currently used to support mobile communication systems, have very different approaches to provide security. For example, one can notice that (a) the early analog cell phones have essentially no security capabilities; (b) the North American Digital Standards have voice privacy using an encryption that is commonly known as presenting various weaknesses; and (c) the European GSM standards support voice encryption, but the GSM networks are subject to a large range of straightforward attacks (as it will be shown in the subsequent chapters).

SECURITY OF MOBILE COMMUNICATIONS.rar SECURITY OF MOBILE COMMUNICATIONS.rar SECURITY OF MOBILE COMMUNICATIONS.rar
Total Reply 1

  • 2014-05-18 14:57

    Thanks


Total 1,424
Number Title Author Date Votes Views
1424
Byte of Python
tanthanh | 2020.05.28 | Votes 0 | Views 45503117
tanthanh 2020.05.28 0 45503117
1423
Surviving the Top Ten Challenges of Software Testing: A People-Oriented Approach (2)
^Software^ | 2019.07.22 | Votes 0 | Views 45944414
^Software^ 2019.07.22 0 45944414
1422
Jmeter Cookbook (1)
VTB | 2019.06.27 | Votes 0 | Views 46385833
VTB 2019.06.27 0 46385833
1421
Java Testing : Maven - Reference (315 Pages) (1)
IT-Tester | 2019.06.26 | Votes 0 | Views 46257140
IT-Tester 2019.06.26 0 46257140
1420
Java Testing : Maven Example (154 Pages)
IT-Tester | 2019.06.26 | Votes 0 | Views 46262433
IT-Tester 2019.06.26 0 46262433
1419
AGILE TESTING - EBOOK (2)
HenryChuks | 2019.05.31 | Votes 0 | Views 45494172
HenryChuks 2019.05.31 0 45494172
1418
“Software Testing Career Package – A Software Tester’s Journey from Getting a Job to Becoming a Test Leader!”
aiitistqb | 2018.10.16 | Votes 0 | Views 45420993
aiitistqb 2018.10.16 0 45420993
1417
Practical Software Testing – New FREE eBook [Download] (2)
aiitistqb | 2018.10.16 | Votes 0 | Views 45444807
aiitistqb 2018.10.16 0 45444807
1416
The Pathologies of Failed Test Automation Projects
aiitistqb | 2018.10.16 | Votes 0 | Views 45293695
aiitistqb 2018.10.16 0 45293695
1415
Selenium WebDriver Practical Guide (4)
meo meo con con | 2018.06.16 | Votes 0 | Views 46075052
meo meo con con 2018.06.16 0 46075052
1414
Python for Informatics
melassiri | 2018.06.04 | Votes 0 | Views 45880192
melassiri 2018.06.04 0 45880192
1413
Hacking - The Art of Exploitation (7)
ravisk | 2018.03.25 | Votes 0 | Views 45451770
ravisk 2018.03.25 0 45451770
1412
Instant Penetration Testing Setting Up a Test Lab How-to (1)
ravisk | 2018.03.24 | Votes 0 | Views 44119180
ravisk 2018.03.24 0 44119180
1411
Practical-Guide-to-Software-System-Testing (3)
ravisk | 2018.03.24 | Votes 1 | Views 46948465
ravisk 2018.03.24 1 46948465
1410
EFFORT estimation software (1)
ravisk | 2018.03.24 | Votes 0 | Views 45773007
ravisk 2018.03.24 0 45773007
1409
Lee Copeland. A Practitioner's Guide to Software Test Design (19)
Unbroken | 2017.12.15 | Votes 0 | Views 45324088
Unbroken 2017.12.15 0 45324088
1408
http response codes (3)
SV369 | 2017.12.14 | Votes 0 | Views 46280734
SV369 2017.12.14 0 46280734
1407
«Hacking Mobile Exposed, Security secrets and solutions» (5)
Unbroken | 2017.12.08 | Votes 0 | Views 46079684
Unbroken 2017.12.08 0 46079684
1406
James A. Whittaker «Exploratory software testing» (8)
Unbroken | 2017.12.08 | Votes 1 | Views 45821530
Unbroken 2017.12.08 1 45821530
1405
FOUNDATIONS OF SOFTWARE TESTING (6)
marklouis | 2017.12.05 | Votes 0 | Views 45733129
marklouis 2017.12.05 0 45733129
1404
Python for informatics (2)
TesterQA | 2017.12.01 | Votes 0 | Views 45565121
TesterQA 2017.12.01 0 45565121
1403
Selenium Testing Tool Cookbook (11)
liliam001 | 2017.11.14 | Votes 0 | Views 44966731
liliam001 2017.11.14 0 44966731
1402
What is SQL Injection? (4)
ArifBaba | 2017.10.28 | Votes 0 | Views 45529628
ArifBaba 2017.10.28 0 45529628
1401
Oracle Middleware Tuning (4)
gpratikg | 2017.10.08 | Votes 0 | Views 45442193
gpratikg 2017.10.08 0 45442193
1400
Microsoft SQL Server 2012 (3)
yoshiharra | 2017.10.08 | Votes 0 | Views 45936576
yoshiharra 2017.10.08 0 45936576
1399
visual studio c sharp
vikasrao | 2017.09.24 | Votes 0 | Views 45557339
vikasrao 2017.09.24 0 45557339
1398
How to Break Web Software: Functional and Security Testing of Web Applications and Web Services (7)
vikasrao | 2017.09.24 | Votes 0 | Views 45335693
vikasrao 2017.09.24 0 45335693
1397
The Art of Unit Testing with Examples in .NET
vikasrao | 2017.09.24 | Votes 0 | Views 45440971
vikasrao 2017.09.24 0 45440971
1396
Scrum (2)
dhoanglong91 | 2017.09.23 | Votes 1 | Views 44869953
dhoanglong91 2017.09.23 1 44869953
1395
Python for Unix and Linux System Administration
Crismachado | 2017.09.22 | Votes 0 | Views 45261086
Crismachado 2017.09.22 0 45261086
1394
Ruby Best Practices (3)
Crismachado | 2017.09.22 | Votes 0 | Views 45096405
Crismachado 2017.09.22 0 45096405
1393
Python in Practice (2)
ManhAnh | 2017.09.05 | Votes 0 | Views 45627490
ManhAnh 2017.09.05 0 45627490
1392
Practical Object-Oriented Design in Ruby (2)
ManhAnh | 2017.09.05 | Votes 0 | Views 44346310
ManhAnh 2017.09.05 0 44346310
1391
Practical Cassandra (2)
ManhAnh | 2017.09.05 | Votes 0 | Views 46032592
ManhAnh 2017.09.05 0 46032592
1390
Development with the Force.com Platform, 3rd Edition (2)
ManhAnh | 2017.09.05 | Votes 0 | Views 46571864
ManhAnh 2017.09.05 0 46571864
1389
Apache Cordova 3 Programming (2)
ManhAnh | 2017.09.05 | Votes 0 | Views 45616529
ManhAnh 2017.09.05 0 45616529
1388
Software Testing - Ron Patton (4)
bugdetective | 2017.09.04 | Votes 0 | Views 46663882
bugdetective 2017.09.04 0 46663882
1387
The Art of Software Testing, 2rd Edition (1)
bugdetective | 2017.09.04 | Votes 0 | Views 45571153
bugdetective 2017.09.04 0 45571153
1386
Explore It!
bugdetective | 2017.09.04 | Votes 1 | Views 45080921
bugdetective 2017.09.04 1 45080921
1385
NoSQl (1)
getmedude | 2017.08.27 | Votes 0 | Views 46432840
getmedude 2017.08.27 0 46432840
1384
Art of testing (10)
dktzm89 | 2017.08.16 | Votes 0 | Views 45775977
dktzm89 2017.08.16 0 45775977
1383
Perl Book (1)
Ravish24 | 2017.08.15 | Votes 0 | Views 45377065
Ravish24 2017.08.15 0 45377065
1382
Automation Testing (5)
Ravish24 | 2017.08.15 | Votes 1 | Views 47332376
Ravish24 2017.08.15 1 47332376
1381
Prince2 model chart
AllGreen | 2017.08.09 | Votes 0 | Views 45081042
AllGreen 2017.08.09 0 45081042
1380
Prince2 for Dummies
AllGreen | 2017.08.09 | Votes 0 | Views 46355469
AllGreen 2017.08.09 0 46355469
1379
Unix and Linux testing (2)
pavan765 | 2017.08.01 | Votes 0 | Views 46498906
pavan765 2017.08.01 0 46498906
1378
Practical Software Testing (6)
Administrator | 2017.07.24 | Votes 0 | Views 45173969
Administrator 2017.07.24 0 45173969
1377
Selenium Notes (1)
masterofall | 2017.07.24 | Votes 0 | Views 45982567
masterofall 2017.07.24 0 45982567
1376
Practical Software Testing
masterofall | 2017.07.24 | Votes 0 | Views 46536339
masterofall 2017.07.24 0 46536339
1375
Lead Generation for Dummies (2)
uday bhaskar | 2017.07.20 | Votes 0 | Views 45807581
uday bhaskar 2017.07.20 0 45807581