2006 IEEE International Conference on Industrial Informatics 2006
DOI: 10.1109/indin.2006.275624
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of UMTS security architecture and services

Abstract: Abstract-This paper presents an in-depth analysis and evaluation of the security of UMTS. Four classes of attacks and threats are discussed in detail. Thereafter, the available security mechanism and services of UMTS are reviewed and evaluated. It is found that most of the potential attacks and threats can be thwarted by the available security services and mechanisms of UMTS.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…To achieve this purpose the user is identified by means of a TMSI on the radio interface which has local importance and is combined with Location Area Identifier (LAI) or Routing Area Identifier (RAI), for the circuit switched and packet switched domain respectively. Whenever a UE tries to access 3G services, it identifies itself by means of the TMSI/LAI or TMSI/RAI [3].…”
Section: User Identity Confidentialitymentioning
confidence: 99%
See 4 more Smart Citations
“…To achieve this purpose the user is identified by means of a TMSI on the radio interface which has local importance and is combined with Location Area Identifier (LAI) or Routing Area Identifier (RAI), for the circuit switched and packet switched domain respectively. Whenever a UE tries to access 3G services, it identifies itself by means of the TMSI/LAI or TMSI/RAI [3].…”
Section: User Identity Confidentialitymentioning
confidence: 99%
“…Partial integrity protection of user data UMTS also has a mechanism which prevents the insertion or deletion, but not the modification, of user data. This characterize is meant to prevent certain bandwidth hijacking attacks while avoiding the cost of full-blown integrity protection mechanisms for user data [1,3]. The integrity security service is comprehended by means of a MAC mechanism that provides both message authentication and integrity protection against intentional modifications.…”
Section: Data Integritymentioning
confidence: 99%
See 3 more Smart Citations