On demand network-wide VPN deployment in GPRS
IEEE Network: The Magazine of Global Internetworking
Alternative Schemes for Dynamic Secure VPN Deployment in UMTS
Wireless Personal Communications: An International Journal
Anonymous authentication protocol for GSM networks
International Journal of Security and Networks
A network-assisted mobile VPN for securing users data in UMTS
Computer Communications
Real-time service provisioning for mobile and wireless networks
Computer Communications
Review: A review of DoS attack models for 3G cellular networks from a system-design perspective
Computer Communications
Vulnerabilities and possible attacks against the GPRS backbone network
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Configurable computing for high-security/high-performance ambient systems
SAMOS'05 Proceedings of the 5th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
IPsec-based end-to-end VPN deployment over UMTS
Computer Communications
Deep Analysis of Enhanced Authentication for Next Generation Networks
International Journal of Grid and High Performance Computing
Hi-index | 0.24 |
In the last few years, we have witnessed an explosion in demand for security measures motivated by the proliferation of mobile/wireless networks, the fixed-mobile network convergence, and the emergence of new services, such as e-commerce. 3G-systems play a key role in this network evolution, and, thus, all stakeholders are interested in the security level supported in the new emerging mobile environment. This paper elaborates on the security framework in 3G mobile networks. The security requirements imposed by the different types of traffic, and by the different players involved (mobile users, serving network and service providers) are investigated. The security architecture, which comprises all the security mechanisms that are projected for the Universal Mobile Telecommunication System (UMTS) network, is analyzed. The employment of traditional security technologies, originally designed for fixed networking, such as firewalls, and static Virtual Private Network (VPN), in order to safeguard the UMTS core network from external attacks, as well as to protect user data when conveyed over the network are examined. Critical points in the 3G-security architecture that may cause network and service vulnerability are identified and discussed. Furthermore, proposals for the enhancement of the 3G-security architecture, and the provision of advanced security services to end-user data traffic within and outside the UMTS core network are discussed. The proposed enhancements can be easily integrated in the existing network infrastructure, and operate transparently to the UMTS network functionality.