written 5.8 years ago by | • modified 5.8 years ago |
Subject: Mobile Computing
Difficulty: Medium
Marks: 4 Marks
written 5.8 years ago by | • modified 5.8 years ago |
Subject: Mobile Computing
Difficulty: Medium
Marks: 4 Marks
written 5.8 years ago by | • modified 5.8 years ago |
It is a collaboration between groups of telecommunications associations, to make a globally applicable third generation (3G) mobile phone system.
Overview of the complete 3G security architecture.
From Fig. four security feature groups are defined. Each of these feature groups meets certain threats, accomplishes certain security objectives:
(i) Network access security (I): The set of security features that provide users with secure access to 3G services, and which in particular protect against attacks on the (radio) access link.
(ii) Network domain security (II): The set of security features that enable nodes in the provider domain to securely exchange signaling data, and protect against attacks on the wireline network.
(iii) User domain security (III): The set of security features that secure access to mobile stations.
(iv) Application domain security (IV): The set of security features that enable applications in the user and in the provider domain to securely exchange messages.