원문정보
초록
영어
Wireless communication is known as key to global development and has become main stream of our daily business. Protecting information and communication speed is an issue which we need to focus on the wireless networks. Universal mobile telecommunication system (UMTS) is evolution of third generation mobile communication system. It was built on the success of global system for mobile communication (GSM), UMTS security is also built upon GSM, so there is lot of security challenges such as the user identity, confidentiality. The international mobile subscriber identity travels through radio interface in free text format without any encryption. Due to this, the user identity and location can be theft which is serious problem. In this paper, we have proposed and emulated a model which protects user identity through IMSI hashing, which will provide anonymity to user. We have compared different hashing techniques and the results are given at the end.
목차
1. Introduction
2. UMTS Architecture
a. Core Network
b. UMTS Terrestrial Radio Access Network (Utran)
c. User Equipment (UE)
d. Node B
3. UMTS Security Features
4. Problem Statement
5. Authentication Process
6. International Mobile Subscriber Identity (Imsi) Structure
7. Hashing Techniques
8. Solution
9. Proposed Authentication Process
10. Conclusion
References