248,382 Hits in 5.5 sec

A man-in-the-middle attack on UMTS

Ulrike Meyer, Susanne Wetzel
2004 Proceedings of the 2004 ACM workshop on Wireless security - WiSe '04  
We show that both of these mechanisms are necessary in order to prevent a man-in-the-middle attack.  ...  Since the UMTS standard requires mutual authentication between the mobile station and the network, so far UMTS networks were considered to be secure against man-in-themiddle attacks.  ...  If the sequence number is in the right range, the mobile station is assured that AUTN was issued recently by its home network.  ... 
doi:10.1145/1023646.1023662 dblp:conf/ws/MeyerW04 fatcat:l2emrwor3vc5tomdqillfa7vai

A proxy mobile IP based layer-3 handover scheme for mobile WiMAX based wireless mesh networks

Min-Kim, Jong-min Kim, Hwa-sung Kim, Il-kyeun Ra
2010 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN)  
In this paper, we present a proxy mobile IP based layer-3 handover scheme for mobile WiMAX based wireless mesh networks.  ...  MIP based handover incures the long handover latency because mobile nodes generate a lot of handover messages in wireless area.  ...  SIMULATION In order to evaluate the performance of proposed handover scheme, we use the NS-2 network simulator. Fig. 4 shows the topology used for the simulation.  ... 
doi:10.1109/icufn.2010.5547209 fatcat:lddt2cyda5b5bnsfgdg5klmeoa

Security for the Third Generation (3G) Mobile System

Colin Blanchard
2000 Information Security Technical Report  
Various means of handling this issue are available. d) The mechanisms for verifying the freshness of sequence numbers in the USIM shall to some extent allow the out-of-order use of sequence numbers.  ...  The HE has some flexibility in the management of sequence numbers, but the verification mechanism needs to protect against wrap around and allow to a certain extent the out-of-order use of quintets.  ... 
doi:10.1016/s1363-4127(00)03007-7 fatcat:5ksumqwekbhgrjvoywchyi54va

Quality-of-service signaling in wireless IP-based mobile networks

R. Bless, M. Zitterbart, J. Hillebrand, C. Prehofer
2003 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)  
In order to provide the necessary quality of service (QoS) on demand in mobile wireless networks, appropriate signaling has to be defined.  ...  We present a mobility-aware QoS signaling architecture that integrates resource management with mobility management.  ...  In a similar manner, the integrated state model shows transitions for • Hard handover • Anticipated handover using a make-before-break sequenceNetwork-initiated anticipated handover • And variations  ... 
doi:10.1109/vetecf.2003.1286383 fatcat:lsfprwrhpvhsplr4ukdeb7etmi

An Efficient Integrated Routing Protocol for Interconnecting Mobile Ad Hoc Network and the Internet

Khaleel Ur Rahman Khan, A Venugopal Reddy, Rafi U Zaman
2009 International Journal of Computer and Electrical Engineering  
Index Terms-Eff-DSDV, Integration Strategy, Mobile ad hoc Network (MANET), Mobile Internet Gateway (MIG)  ...  The proposed framework uses one of the ad hoc hosts known as Mobile Internet Gateway (MIG) to act as a bridge between the two networks.  ...  In order to be able to communicate with both network types, the MIG uses the protocols of the wired network and the wireless ad hoc Network.  ... 
doi:10.7763/ijcee.2009.v1.6 fatcat:yq2wugowkndphktjmgj7xx4zqa

STACO - An accounting configuration architecture for multi-service mobile networks

Peter Racz, Burkhard Stiller
2009 2009 IFIP/IEEE International Symposium on Integrated Network Management  
The message sequence chart for the network connection setup use case is shown in Figure 3 . The user wants to connect via AP1 to the network.  ...  Afterwards, the sequence of actions is identical to the network connection setup use case.  ... 
doi:10.1109/inm.2009.5188886 dblp:conf/im/RaczS09 fatcat:iz3g5fn3uzesvdahcqt2nkwhum

Enhancing Security Using Mobility-Based Anomaly Detection in Cellular Mobile Networks

B. Sun, F. Yu, K. Wu, Y. Xiao, V.C.M. Leung
2006 IEEE Transactions on Vehicular Technology  
Location information is an important feature in users' profiles in cellular mobile networks.  ...  A threshold policy is then used in both schemes to determine whether a mobile device is potentially compromised or not.  ...  Similarly, the word string is used in discussing LZ algorithms, while cell list is used in cellular mobile networks. A.  ... 
doi:10.1109/tvt.2006.874579 fatcat:752oi3swp5cl5kaehlow7o4fpi

An MDC-based video streaming architecture for mobile networks

Claudio Greco, Giovanni Petrazzuoli, Marco Cagnazzo, Beatrice Pesquet-Popescu
2011 2011 IEEE 13th International Workshop on Multimedia Signal Processing  
We integrated the proposed technique in a mobile ad-hoc streaming protocol, and tested it using a group mobility model.  ...  If only one description is received, the missing frames are reconstructed using temporal high-order motion interpolation (HOMI), a technique originally proposed for distributed video coding.  ...  The encoded sequence in this test is transmitted over a mobile adhoc network (see Tab. II) using the ABCD protocol described in Sec. IV-A.  ... 
doi:10.1109/mmsp.2011.6093829 dblp:conf/mmsp/GrecoPCP11 fatcat:n2gom3b74fegvpnrdfr22ivnzq


Serhii Moroz, Anatolii Tkachuk, Mykola Khvyshchun, Stanislav Prystupa, Mykola Yevsiuk
2022 Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska  
Thus, user authentication in UMTS, as well as in the GSM network, is carried out using encryption with a common key using the "hack-response" protocol (the authenticating party sends a random number to  ...  In particular, the following dangerous types of attacks have been identified, to which mobile network subscribers are sensitive: sniffing; leakage of personal data; leakage of geolocation data; spoofing  ...  To close data in LTE networks, streaming encryption is used by superimposing a pseudo-random sequence on open information using the XOR operator.  ... 
doi:10.35784/iapgos.2877 fatcat:ck52b3pvfjdknht3qjemc4dmbq

Performance Evaluation of Adhoc Routing Protocols through NCTUns 6.0

Wajid Mumtaz, Beenish Niaz
2011 International Journal of Computer Applications  
Routing protocols solve many problems of ad hoc networks. In this paper we are aiming to provide a performance comparison of three routing protocols i.e. ADV, AODV and DSDV.  ...  NCTUns 6.0 is used as a simulator. The performance metrics for evaluating the protocols are number of packet dropped, number of packet collision and throughput.  ...  result in a loss of packet integrity and compared the network performance.  ... 
doi:10.5120/2361-3097 fatcat:dxkxl3nuwjfpfjsdfpfyllxm2u

Security analysis and enhancements of 3GPP authentication and key agreement protocol

Muxiang Zhang, Yuguang Fang
2005 IEEE Transactions on Wireless Communications  
The protocol, called AP-AKA, also eliminates the need of synchronization between a mobile station and its home network. AP-AKA specifies a sequence of six flows.  ...  Moreover, we demonstrate that the use of synchronization between a mobile station and its home network incurs considerable difficulty for the normal operation of 3GPP AKA.  ...  It might be caused by an adversary by replaying a pair of used and . The out-of-order use of authentication vectors in the serving network could also cause synchronization failure.  ... 
doi:10.1109/twc.2004.842941 fatcat:hrug6jpt6ba5lowyfokl3242va

Research of Ad Hoc Networks Access Algorithm

Ma Xiang
2012 Physics Procedia  
With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication  ...  range of mobile communication system, even business adjacent to the community, improve edge data rates.  ...  In the proposed scheme, in order to provide gateway information with minimum overhead, the use of a periodic advertisement is proposed. And each mobile node needs to maintain two tables.  ... 
doi:10.1016/j.phpro.2012.03.379 fatcat:zof35fipdnf5zopouuafw6fe4m

Security in third Generation Mobile Networks

Christos Xenakis, Lazaros Merakos
2004 Computer Communications  
This paper elaborates on the security framework in 3G mobile networks.  ...  The proposed enhancements can be easily integrated in the existing network infrastructure, and operate transparently to the UMTS network functionality.  ...  ) user response to challenge in GSM/GPRS RNC Radio Network Controller SA Security Association SG Security Gateways SRES Signed response SN Serving Network SQN Sequence number SQN HE Sequence  ... 
doi:10.1016/j.comcom.2003.12.004 fatcat:mknokvlbrnd63kqpsze7mw3ijq

Representation Learning from Time Labelled Heterogeneous Data for Mobile Crowdsensing

Chunmei Ma, Qing Zhu, Shuang Wu, Bin Liu
2016 Mobile Information Systems  
Therefore, we propose a new representation learning method of heterogeneous data with time labels to extract typical features using deep learning.  ...  Mobile crowdsensing is a new paradigm that can utilize pervasive smartphones to collect and analyze data to benefit users.  ...  Acknowledgments This work was supported in part by the Application Foundation and Advanced Technology Research Project of Tianjin (no. 15JCQNJC01400) and the Scientific Special Commissioner Project of  ... 
doi:10.1155/2016/2097243 fatcat:555exgit2bepvhg2jlg4vgh6mi

An Extension of TRIANGLE Testbed with Model-Based Testing [chapter]

Laura Panizo, Almudena Díaz, Bruno García
2018 Lecture Notes in Computer Science  
This paper presents the testing framework developed in the TRIAN-GLE project 1 that integrates a complete mobile network testbed and a model-based testing approach, which is based on model checking, to  ...  automatically evaluate the apps performance in different network scenarios.  ...  A test case defines the configuration of the network scenarios, the measurements that have to be collected and the app user flow (sequence of actions) that will be used to activate the feature under test  ... 
doi:10.1007/978-3-319-94111-0_11 fatcat:66apqzitlfgjnlrlrjgxvwa2ie
« Previous Showing results 1 — 15 out of 248,382 results