A Femto system is able to provide new services with higher data rate at relatively lower cost than traditional cellular system. Operators have already indicated their interest in this area and the number of deployments is ever increasing. Security is a critical part of Femto in all aspects of the operation of Femto services. In this paper, we analyze the security of Femto based on 3GPP system architecture. In addition, we will look into the details of other security aspects of Femto system, including security requirement and security mechanism.
The explosion of mobile broadband growth has created a greater demand on the operators and vendors working together to place more and more telecom gears into wireless networks at a record pace to satisfy the users' insatiable appetite for mobile data. The desire for undiminished security coupled with more sophisticated attacks in an ICT world where the traditionally closed telecom networks are going through a change of open architecture, open platform, and virtualization, the entire telecommunication community has taken a proactive approach to re-evaluate the security assurance process to ensure that the products are as secure as ever. The operators and the vendors have come together under the roof of 3GPP to create such a security assurance standards to be applied, recognized, and accepted in all areas for which 3GPP network products are sold and marketed. This paper will examine the many issues, hurdles, and challenges of the standardization of security assurance.
Network denial-of-service attacks, which exhaust the server resources, have become a serious security threat to the Internet. Public Key Infrastructure (PKI) has long been introduced in various authentication protocols to verify the identities ofthe communicating parties. Although the use ofPKI can present difficulty to the denial-of-service attackers, the underlying problem has not been resolved completely, because the use ofpublic-key infrastructure involves computationally expensive operations such as modular exponentiation. An improper deployment ofthe public-key operations in a protocol allows the attacker to exhaust the server's resources. This paper presents a public-key based authentication protocol integrated with a sophisticated client puzzle, which together provides a good solution for network denial-of-service attacks, and various other common attacks. The basic strategy to protect against denial of service is to impose an adjustable cost on the attacker while it launches the attacks. The proposed client puzzle protocol can also be integrated with other network protocols to protect against denial-of-service attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.