Documente Academic
Documente Profesional
Documente Cultură
VLR
Switching
and
routing
HLR/AuC
Home
network
Other Networks
(GSM, fixed,
Internet, etc.)
SIM
Visited network
Authentication
Confidentiality
protects voice, data and sensitive signalling information
(e.g. dialled digits) against eavesdropping on the radio
path
Anonymity
protects against someone tracking the location of the user or
identifying calls made to or from the user by eavesdropping on
the radio path
To ensure privacy .
All user-related data is encrypted. After
authentication, BTS (base transceiver station) and
MS apply encryption to voice, data, and signaling
by applying the cipher key Kc .
No requirement of
decrypting skills
Need a instrument that
captures microwave
Gains control of
communication
between MS and
intended receiver
Mutual Authentication
provides enhanced protection against false base
station attacks by allowing the mobile to
authenticate the network
Data Integrity
provides enhanced protection against false base
station attacks by allowing the mobile to check
the authenticity of certain signalling messages
Flexibility
Security features can be extended and enhanced
as required by new threats and services
(1) Distribution of
authentication vectors
(2) Authentication
(3) CK,IK
(3) CK, IK
MSC
MSC
USIM
USIM
ME
ME
User
Equipment
BTS
H
HLR
HLR
AuC
AuC
RNC
Access Network
(UTRAN)
SGSN
SGSN
Visited
Network
Home
Network
No security for
communication
between network
elements in GSM
Easy to gain
access to
sensitive
information such
as Kc
Network Domain
Security in UMTS
foils these attacks
chd.naveen@gmail.com
/chd.naveen
@saini_naveen87
/NaveenKumar11
www.elixir-india.com