Please use this identifier to cite or link to this item: http://elea.unisa.it/xmlui/handle/10556/1524
Full metadata record
DC FieldValueLanguage
dc.date.accessioned2014-09-17T08:47:12Z
dc.date.available2014-09-17T08:47:12Z
dc.description2009 - 2010en_US
dc.description.abstractCellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and text messages and new services continue to be added. The frequencies over which voice is transmitted are public, so voice encryption is necessary to avoid interception of the signal over the air. But once the signal reaches the operators Base Station (BS), it will be transmitted to the receiver over a wired or wireless mean. In either case, no protection is de ned. This does not seem a problem, but this is not true. Along the path across operator network, voice is at risk. It will only be encrypted again, with a di erent key, from the BS to the receiver if the receiver is herself a mobile user. Moreover, voice encryption is not mandatory. The choice whether or not to accept an unprotected communication is up to the network. When adopted, the same encryption algorithm is used for sending SMS messages between mobile telephones and base stations and for encrypting of calls. Unfortunately, vulnerabilities in this encryption systems were already revealed more than 10 years ago and more continue to be discovered. Currently the most popular communication technologies are the GSM and the UMTS. The UMTS is in use as a successor to GSM. Along with mobile phone services, It provides rapid data communication. The security algo- rithms in UMTS di ers from GSM in two important ways: encryption and mutual authentication. Although security standards have been improved, the end- to-end security is not provided. .. [edited by Author]en_US
dc.language.isoenen_US
dc.subject.miurINF/01 INFORMATICAen_US
dc.contributor.coordinatoreNapoli, Margheritaen_US
dc.description.cicloIX n.s.en_US
dc.contributor.tutorDe Santis, Alfredoen_US
dc.identifier.DipartimentoInformaticaen_US
dc.titleSecure End-to-End Communications in Mobile Networksen_US
dc.contributor.authorPetagna, Fabio
dc.date.issued2011-05-06
dc.identifier.urihttp://hdl.handle.net/10556/1524
dc.identifier.urihttp://dx.doi.org/10.14273/unisa-367
dc.typeDoctoral Thesisen_US
dc.subjectSecurityen_US
dc.subjectMobileen_US
dc.subjectCommunicationen_US
dc.publisher.alternativeUniversita degli studi di Salernoen_US
Appears in Collections:Informatica

Files in This Item:
File Description SizeFormat 
tesi_di_dottorato_F_Petagna.pdftesi di dottorato5.91 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.