Secure Military Communications on 3G, 4G and WiMAX

作者: Panagiotis Schoinas

DOI:

关键词:

摘要: Abstract : Today wireless communications offer great convenience and efficiency, but concerns about security must be addressed. Wireless are considered less secure than wired or fiber-based systems because the data is transmitted over radio channel making it more susceptible to eavesdropping interception. Thus, needs special attention. Confidentiality, integrity availability objectives of solutions. Attacks such as Man-in-the-Middle, replay, Denial-of-Service mitigated eliminated by solutions those discussed in this thesis. Data disclosure unauthorized people, user identity location disclosure, impersonation a valid user, tracking subscriber capabilities few potential risks that can lead mission failure even cost people s lives. This thesis explores how securely leverage three cellular technologies, 3G, 4G/LTE WiMAX, through an analysis their features. The architectures these technologies described. Their vulnerabilities attack vectors analyzed. A protocols techniques address mitigate deficiencies way they enforce provided. Furthermore, importance military considered.

参考文章(25)
Daniel Caragata, Galyna Akmayeva, Charles Shoniregun, Safwan El Assad, UMTS security: Enhancement of identification, authentication and key agreement protocols international conference for internet technology and secured transactions. pp. 278- 282 ,(2011)
Colin Blanchard, Security for the Third Generation (3G) Mobile System Information Security Technical Report. ,vol. 5, pp. 55- 65 ,(2000) , 10.1016/S1363-4127(00)03007-7
Yu-Lun Huang, Chih-Ya Shen, Shiuhpyng Winston Shieh, S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks IEEE Transactions on Vehicular Technology. ,vol. 60, pp. 4509- 4519 ,(2011) , 10.1109/TVT.2011.2168247
Mahdi Aiash, Glenford Mapp, Aboubaker Lasebae, Raphael Phan, None, Providing Security in 4G Systems: Unveiling the Challenges international conference on telecommunications. pp. 439- 444 ,(2010) , 10.1109/AICT.2010.24
Xiehua Li, Yongjun Wang, Security Enhanced Authentication and Key Agreement Protocol for LTE/SAE Network international conference on wireless communications, networking and mobile computing. pp. 1- 4 ,(2011) , 10.1109/WICOM.2011.6040169
J. B. Abdo, J. Demerjian, H. Chaouchi, G. Pujolle, EC-AKA2 a revolutionary AKA protocol international conference on computer applications technology. pp. 1- 6 ,(2013) , 10.1109/ICCAT.2013.6521993
Stephen Farrell, The WAP Forum’s Wireless Public Key Infrastructure Information Security Technical Report. ,vol. 5, pp. 23- 31 ,(2000) , 10.1016/S1363-4127(00)03004-1
N. Seddigh, B. Nandy, R. Makkar, J.F. Beaumont, Security advances and challenges in 4G wireless networks conference on privacy, security and trust. pp. 62- 71 ,(2010) , 10.1109/PST.2010.5593244
Constantinos Kolias, Georgios Kambourakis, Stefanos Gritzalis, Attacks and Countermeasures on 802.16: Analysis and Assessment IEEE Communications Surveys and Tutorials. ,vol. 15, pp. 487- 514 ,(2013) , 10.1109/SURV.2012.021312.00138
Bruce Bennett, Pamela Hemmings, Operational Considerations of Deploying Wimax Technology as a Last-Mile Tactical Communication System military communications conference. pp. 1560- 1566 ,(2006) , 10.1109/MILCOM.2006.302298