preview

Essay On 3G Security

Better Essays

Wireless Networks: 3G Security Threats and Possible Solutions
Md. Mahim Bin Firoj
ID: 102-19-1239
Department of ETE
E-mail: mahim_1239@diu.edu.bd

ABSTRACT
Cellular communication has become an important factor in our daily life. It could be targeted by any hacker to steal the important information with destructive purpose. Therefore, we need to provide strong security for users so that hackers failed to achieve their purpose. In this article it has been discussed limitations of 3G cellular networks, major security issues along with some severe level attacks. Then it has also been discussed in this article that what step 3G networks has taken to prevent those issues.

KEYWORDS
Limitation of 3G networks, Security issues, possible intense …show more content…

[2]
III. SECURITY ISSUES
1. Authentication: Cellular networks have a large number of subscriber. Each user has to be authenticated to ensure that the correct people are using the network.

2. Integrity: It is important that the data such as SMS, chat, and file transfer arrives without any modification.

3. Confidentiality: In sensitive communication, it’s essential to have a secure channel in order to transmit the information.

4. Access control: The cellular device may have some files that needs to be restricted to them. The device might access a database where some access control is necessary.
5. OS in mobile device: Some phones may have java based OS, some have Microsoft based on OS and have the same ability as desktop computer. So issues may arise in those OS which are open security holes.

6. Web services: This use HTTP protocol which opens variety of security issues such as viruses, denial of service attack etc.

7. Location Detection: The actual location of a user needs to be kept hidden for privacy reasons of that user. With the move to IP based networks, their location might be compromised.

8. Viruses and malware: The first virus that attacked the cellular device was Liberty. An affected device is easy to use in order to destroy a cellular infrastructure.

9. Download contents: Spyware or malwares are unintentionally downloaded by the user due to lack of

Get Access