Anonymous roaming in universal mobile telecommunication system mobile networks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous roaming in universal mobile telecommunication system mobile networks

A secure roaming protocol for mobile networks is proposed. Roaming has been analysed in some schemes from the security point of view; however, there are vulnerabilities in most of them and so the claimed security level is not achieved. The scheme offered by Wan et al. recently is based on hierarchical identity-based encryption, in which the roaming user and the foreign network mutually authenti...

متن کامل

A Novel Security Algorithm for Universal Mobile Telecommunication System

The user authentication process is an important task in mobile networks. With the development of new standard Universal Mobile Telecommunication System (UMTS), the security weaknesses of previous standards are removed. However one security weakness has been found by researchers in UMTS, which is the sending of user's International Mobile Subscriber Identity (IMSI) in plain text over the air int...

متن کامل

Base Station System Configurations for Future Universal Mobile Telecommunication Systems

This paper presents a study of base station system configurations for the Universal Mobile Telecommunication System (UMTS). The base station system (BSS), being the interface between the mobile terminal and fixed network, should be capable of handling a huge amount of traffic, mobility, and a high signaling load which is expected in the UMTS. Several functions that should be supported by BSS ar...

متن کامل

Inter-operator roaming scenarios for third generation mobile telecommunication systems

In third generation multi-operator mobile telecommunication systems, terminal operations will allow users to select the desirable operator among the ones available, provided that the user access rights are maintained. In this paper, three alternative (interoperator) roaming scenarios between public and private operators are proposed. The first scenario considers private operators as autonomous ...

متن کامل

Mobile and Wireless Telecommunication Networks

Even though the radio was invented more than 100 years ago, it has not been until 10-15 years ago that widespread use of wireless communications has begun. While before then it was mainly used by police and military, now the capability of communicating without being constrained to a fixed physical location is within everyone’s reach. The booming industry which has been growing at such an astoun...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IET Information Security

سال: 2010

ISSN: 1751-8709

DOI: 10.1049/iet-ifs.2009.0154