Wireless Networks: 3G Security Threats and Possible Solutions
Md. Mahim Bin Firoj
ID: 102-19-1239
Department of ETE
E-mail: mahim_1239@diu.edu.bd
ABSTRACT
Cellular communication has become an important factor in our daily life. It could be targeted by any hacker to steal the important information with destructive purpose. Therefore, we need to provide strong security for users so that hackers failed to achieve their purpose. In this article it has been discussed limitations of 3G cellular networks, major security issues along with some severe level attacks. Then it has also been discussed in this article that what step 3G networks has taken to prevent those issues.
KEYWORDS
Limitation of 3G networks, Security issues, possible intense
…show more content…
[2]
III. SECURITY ISSUES
1. Authentication: Cellular networks have a large number of subscriber. Each user has to be authenticated to ensure that the correct people are using the network.
2. Integrity: It is important that the data such as SMS, chat, and file transfer arrives without any modification.
3. Confidentiality: In sensitive communication, it’s essential to have a secure channel in order to transmit the information.
4. Access control: The cellular device may have some files that needs to be restricted to them. The device might access a database where some access control is necessary.
5. OS in mobile device: Some phones may have java based OS, some have Microsoft based on OS and have the same ability as desktop computer. So issues may arise in those OS which are open security holes.
6. Web services: This use HTTP protocol which opens variety of security issues such as viruses, denial of service attack etc.
7. Location Detection: The actual location of a user needs to be kept hidden for privacy reasons of that user. With the move to IP based networks, their location might be compromised.
8. Viruses and malware: The first virus that attacked the cellular device was Liberty. An affected device is easy to use in order to destroy a cellular infrastructure.
9. Download contents: Spyware or malwares are unintentionally downloaded by the user due to lack of
However, the extent of the problem does not just end at the seizure of the cellular device, and
The supporting evidence needed to properly have functional operational for security and it may come in several operational factoring of factors such as information Integrity, Personal Integrity, Company Integrity and just the normal notion the device integrity acknowledged as Android or Blackberry. The two devices that function may have their information in harm’s way by data usage on both devices. This information can be damaged in one or more ways named as risk or attack.
Information will only have value if customers can access it at the right times. Availability can be affected by system errors, and malicious attacks as well as infrastructure problems. Availability is ensured by maintaining hardware as well as repairing hardware immediately when need arise. A correct functioning operating system should also be maintained in the environment free of software conflicts. Adequate communication bandwidth should also be addressed as well as preventing bottlenecks from occurrence.
This article gives a synopsis of threats to the mobile devices and the data existing in them and the available defenses. It classifies seven different types of threats on mobile devices and then it discusses about the precautions that can be taken to avoid these threats. It recommends how to prioritize the different threats and defenses.
To confirm that the information sent is safe and has not been penetrates and the information never changed during the the transmitter there is a main services will be handled which is confidentiality, integrity, and authenticity [20].
One of the ethical issues that stems from using technology and protecting information is, putting total trust
Mobile networks have made a remarkable growth in the last 20 years. In our time 4G is the main network used to ensure IP connectivity for real time and non-real time services. It will be wrong not to mention that in most 3rd world countries 3G and 2G networks are still of great importance in the field of communication due to poor connectivity issues preventing them to utilize the services of 4G services. This paper will mainly talk about the growth of mobile networks from say 3G to 4G and also mention in details what we expect from 5G network. It will also mention some of the positive and negative impacts to our Kenyan society and ways to ensure that we benefit fully from the services. The proposal in this paper is fundamental shift in the mobile networking philosophy compared to existing 3G and near-soon 4G mobile technologies, and this concept is called here - the 5G.
Cell Phones are now a part of our everyday life. This is a fact for just about every modern American. We use them to capture family moments, schedule appointments, handle finances, and listen to our favorite bands. We have all this information on our cell phones, and companies like Apple and Google are fighting to keep this information secure from prying eyes.
2. Which of the following is intended to solve the problem that financial data used in one application is not easily transferable to other applications?
The Apple Inc. iPhone mobile devices have been a successful phone in the technology era. There are common vulnerabilities that have the ability to compromise a mobile device. The vulnerabilities are able to give attacks a leverage in obtaining sensitive information or secured data. The first common vulnerability is jail breaking which allows third party applications without an official SDK from Apple to run on the iPhone. A fix to this vulnerability would be to not download any applications to jailbreak the mobile device or any untrusted mobile applications. Another vulnerability to the Apple iPhone is the Airdrop figure, which allows a user to unintentionally download malicious malware when intended to share files with contacts. Solving this vulnerability includes disabling the Airdrop or only allowing Airdrop to contacts. An additional vulnerability is public Wi-Fi information stealing that uses a public network to gain information on your mobile device. The vulnerability fix would be to avoid unencrypted public wireless networks.
Two of the common known attacks on computing systems are the deployment of computer viruses and malware.
Abstract—The development in mobile devices and wireless technologies opens up unlimited choices of mobile services such as mobile commerce. These advances make access services available and convenient everywhere at any time. Since mobile users usually move, accessing services becomes unavailable especially in some locations that are not covered by their home networks. Therefore, it becomes necessary to roam into foreign networks in order to access such services. However, authenticating visiting users by a foreign network results in some security concerns. This challenge lies in the fact that a foreign network provider does not initially have the authentication credentials of the mobile users. The existing approaches are either roaming
Sub point 1: Mobile devices are small and portable, however they can be easily stolen. Hundreds of thousands of cell phones, laptops and tablets are lost each year. The mobile device in the hands of a stranger provides easy
3. In our project we are providing triple layer security to the data while transmission.
REPORT ON ICT INFRASTUCTURE, EFFECTIVE IMPLEMANTION OF MOBILE APPLICATION WITH ANY OPERATTING SYSTEM WITH SECURITY FEATURES AND COSTING