Security issues in Cellular Wireless Networks

Requirement

Security issues in Cellular Wireless Networks

Solution

Introduction

In recent years, there has been a steady change in innovation. Security in remote cell systems decides the framework for managing, ensuring and sharing the sensitive data securely. Cell Communication has turned into an essential piece of our day to day life. Other than utilizing PDAs for voice correspondence, we can easily access the Internet facility, conduct fiscal exchanges, send instant messages and so forth utilizing our phones, and new administrations keep on being included. Nevertheless, the cellular wireless medium is found to have certain confinements over the wired medium, for example, open access, restricted data transfer capacity and frameworks multifaceted nature. These constraints make it troublesome albeit conceivable to give security components, for example, validation, respectability and classification [2]. The present era of 3G and 4G systems are equipped with packet switched core that is directly connected to outside systems, for example, the Internet has made it extremely vulnerable to new sorts of assaults, for example, refusal of administration, worms, viruses and so forth that have been utilized against the Internet. This paper deals with the confinements of cellular wireless systems, their security concerns, and the diverse sorts of assaults. Further the discussion of various the strides taken in the new 3G systems to battle the diverse security dangers will be discussed.

The experts of Allassignmenthelp.com can provide computer science assignment help for all modules based on your university's syllabus. We have the ability and knowledge to assist you with any aspect of computer network assignments. The students can anytime take our computer programming assignment help and score their desired grades.

Goal

The Cellular Networks has enormous, complex infrastructure with numerous elements planning together, for example, the IP Internet organizing with the center system. Also, in this way it introduces a test for the system to give security at each conceivable correspondence way. The paper tries to bring the matter into consideration so as to increase the researches and development for ensuring the safety in the cellular wireless systems. Further the paper discusses new security mechanisms that were proposed by many types of research in the same field of study.

Discussion

Types of cell phones

There are various sorts of mobile phones, and each has its security profile. First, the paper discusses the various types of requiring know the sort of cellphone people use, to comprehend the security of our phone.

  • (a.)     AMPS or Advanced Mobile Phone System
    U.S. Government Communications Commission (FCC) in 1983, approved the simple wireless standard called AMPS (Advanced Mobile Phone System) and initially utilized them in Chicago. AMPS utilized frequencies range between 824 megahertz (MHz) and 894 MHz for analog mobile phones. These are the oldest cellular systems where the voice was transmitted as the signal for analog systems, and the encryption of scrambling was avoided. Hence, these phones were easy to be eavesdropped especially while using handheld scanners. Further limitations in these phones included poor battery life, extremely low sound quality. Additionally, these service providers used to charge more for their usage.

  • (b.)    Global System for Mobile Communications (GSM) 
    Global System for Mobile Communication (GSM) is regarded as one of the most prominent cell phone structure; it represents about 70% of the world's modernized cell phones. As demonstrated by an official proclamation by the GSM Association in May 2001, there are around billions of GSM cell phones being utilized in more than 168 countries. The outstanding accomplishment in versatile data moves is relied upon in far reaching to GSM. It gives the purchasers giving purchasers a steady organization in more than 168 countries owning to its global meandering capability. The voice in these cell phones is decrypted at the base station and then it is sent over to the telephone network. It was noticed that the GSM phones provided more privacy when it was compared to analog ones. The GSM phones could be eavesdropped upon by the cellular telephone company, the government organization, or any other organization or any individual who accesses to the switching equipment of the telephone network. (Global Telecoms Insight, n.d.)

  • (c.)    Time division multiple access (TDMA)
    Time division multiple access (TDMA) can be defined as the channel access method (CAM) that is utilized for facilitating channels that share without any interference. TDMA further permits multiple stations to share and use the same transmission channel by dividing signals into different time slots. Clients transmit in quick progression, and everyone uses their time space. Along these lines, different stations (like mobiles) usually use same frequency channel yet just utilize some portion of its ability. But the TDMA phones are not used these days. The use of At&T had made these phones vulnerable to be eavesdropped by the digital scanners and “soft radios” (Falconer, Adachi and Gudmundson, 1995)

  • (d.) Code division multiple access (CDMA)
    Code division multiple access (CDMA) can be considered as the digital cellular network standard which uses the technology of spread-spectrum. This innovation does not contract transfer speed's computerized signs or frequencies but rather spreads it over a completely accessible range or different channels using division. Consequently, there is enhanced voice and information correspondence capacity and a highly secured and private line. The CDMA computerized standard is a main correspondences system standard in North America and parts of Asia. Qualcomm, a US-based remote correspondences organization, licensed CDMA and marketed this innovation. (Andrews, n.d.)

  • (e.)    Integrated digital enhanced network (iDEN)
    Incorporated advanced improved system (iDEN) was a versatile telecommunication technology. Even though it is a technology for a cellular system, iDEN is known widely for its great support to the cell phones along with the push-to-talk (PTT) capacity that has the capability to work like walkie-talkies. Despite the fact that iDEN has a few similitudes with customary PTT frameworks, it likewise offers numerous preferences. (Integrated Digital Enhanced Network, n.d.)

Generations of Cellular Networks

In a previous couple of decades, the wireless cellular innovations have been characterized by generation, which to a great extent indicates the type of services and the speed of the information exchange of every class of these technologies. (I. T. Engg Portal, n.d.)
(a.)    First Generation or 1G
It was the first cellular network that was introduced in the 1980s. These had the capability of transferring voice at around 9.6 kbps max speed. These systems were referred to as Advanced Mobile Phone System (AMPS) in the United States and Nordic Mobile Telephony (NMT) in Europe. These systems use the analog modulations for transmitting the information and data as per the continuously varying waveform. This cellular system had many limitations like zero support for the encryption, low sound quality, etc.  
(b.)    Second Generation or 2G and 2.5 G
Second generation (2G) cellular networks or the personal communication services (PCS) were the first to introduce the digital modulation. The digital modulation meant that voice could be translated to the digital code and then again into the analog or the radio signals. Due to the digital nature, the limitations of 1G overcame with time. Various 2G technologies like the digital AMPS (D-AMPS), Code Division Multiple Access (CDMA), North American Time Division Multiple Access (NA-TDMA), etc. were deployed in the United States. The 2G was more secured than the 1G and the digital encryption in 2G has higher security and safety basically to the data and the calls. But the limitation was no network coverage in the areas with weak digital signals.
2.5 G systems are the cellular technology that uses the general packet radio service (GPRS). These systems have the capability of enhancing the capacity of data of GSM and hence mitigating some of the limitations present. General packet radio service or GPRS supplements the capabilities of packet-switched to the networks like GSM and TDMA networks. It can send the text, pictures, and illustrations-rich information as packets at quick speed as it works is based on the emails. Further, it has the circuit-exchanged technology that has a long and fruitful history, yet it is not adequate for short information transactions and instant or always on-service. But the 2G along with 2.5 G were not found to be seamless and not of much use.
The data services given by the 2G include the following:

  • 1.    Short Messaging Service (SMS);

  • 2.    High-Speed Circuit-Switched Data (HSCSD);

  • 3.    General Packet Radio Service (GPRS);

  • 4.    Enhanced Data Rates for GSM Evolution (EDGE) and

  • 5.    Cellular Digital Packet Data (CDPD).

(c.) Third Generation or 3G
3G technologies use TDMA as well as CDMA. 3G or the Third Generation Technology utilizes value-added services. These value added services include television on mobile, GPS or the global positioning system along with the option of video conferencing. 3G has the elementary feature of faster data transfer rates.
System verification has helped to win the users' trust and hence encouraged the consumer satisfaction because the client can depend on its system as a reliable source of exchanging the important data. 3G network is much more adaptable and flexible, as it has the capacity of supporting five more major technologies of radio. These radio advances will be operated under the CDMA, TDMA and FDMA and the CDMA would be responsible for holding IMT-DS (direct spread), IMT-MC (multi transporter).
(d.)    Fourth Generation or 4G
4G Technology is essentially the augmentation in the 3G innovation with more data transmission and administrations offers in the 3G.  4G Technology offers high information rates that will create new patterns for the business sector and prospects for new set ups and also for the upcoming telecom organizations. 4G systems, when entwined with cell telephones with in-built higher resolution computerized cameras furthermore with the High Definition capacities will encourage video web journals
Significance
Various security issues have been found in the cellular wireless systems which include:
Security issues
Contrasted with Wired Networks, Wireless Cellular Networks have a lot of confinements. (Karthik, 2015)

  • 1.    Open Wireless Access Medium: As the communication is taking place on the wireless channel, there is an absence of the physical boundary that could easily isolate an assailant from the network.

  • 2.    Limited Bandwidth: Although wireless transfer speed is expanding ceaselessly, due to channel conflict it is mandatory for everybody to share the medium.

  • 3.    System Complexity: Wireless frameworks are more mind boggling because of the need to strengthen the mobility and for making utilization of the channel adequately. By adding more multifaceted nature to frameworks, possibly new security vulnerabilities can be presented.

  • 4.    Limited Power: Wireless Systems expend a great deal of power and in this way have a restricted time battery life.

  • 5.    Limited Processing Power: The processors introduced on the wireless gadgets are expanding, yet at the same time, they are not sufficiently capable of completing intense processing.

  • 6.    Relatively Unreliable Network Connection: This wireless medium is an inconsistent medium with a high rate of mistakes contrasted with a wired system.

When deploying any cellular infrastructure, numerous security matters have to be taken into contemplation. The importance of considering these security issues has improved with the arrival of advanced networks like the 3G. (Karthik, 2015)

  • 1.    Authentication: Cellular systems have an extensive number of subscribers, and each must be validated in order to guarantee that the right kind of individuals is making the use of the system. Since the reason for 3G is to empower individuals to communicate with other from anyplace on the planet, the issue of cross-district and cross-provider confirmation turns into an issue.

  • 2.    Integrity: With data services, for example, SMS, talk and record exchange it is critical that the information lands with no alterations. (KumarSingh, Joshi & Singhal, 2013)

  • 3.    Confidentiality: With the expanded utilization of the cellular phones during the sensitive communication, there is a requirement for a safe direct so as to transmit data. (KumarSingh, Joshi & Singhal, 2013)

  • 4.     Access Control: The Cellular gadget might have records that need confined access to them. The gadget may get to a database where some kind of part based access control is fundamental.

  • 5.    Operating Systems in Mobile Devices: Cellular Phones have advanced from low processing power, specially appointed supervisors to high power processors and undeniable working frameworks. A few telephones might utilize a Java Based framework; others might make use of Microsoft Windows CE while some are having the same capacities as a desktop PC. Issues might emerge in the OS, which may open security openings that can be exploited.

  • 6.    Web Services: A Web Service is a part that gives functionality that is open through the web utilizing the standard HTTP Protocol. This opens the cell gadget to the assortment of security issues, for example, buffer overflows, virus, attack service denial, etc.

  • 7.    Location Detection: The real area of a cell gadget should be kept covered up for reasons of providing protection and privacy to the users. With the move to IP-based systems, the issue emerges that a client might be connected with an access point and subsequently their area may be compromised.

  • 8.    Viruses and Malware: With expanded functionality given to cell frameworks, issues common in superior frameworks, for example, viruses and malware emerge. The principal virus that showed up on cell gadgets was Liberty. An influenced gadget can likewise be utilized to make an attack to the cell system framework by turning into a part of the attack service denial etc.

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

Types Of Attacks

Because of the large design of a cell system, there is an assortment of assaults that the foundation is interested in. (Karthik, 2015)

  • 1.    Denial of Service (DOS): This is likely the most intense assault that can cut down the whole system base. Sending of excessive information to the system that more than the system can deal with is one of the major reason of its cause. It results in clients being not able to get to network resources and services.

  • 2.    Distributed Denial Of Service (DDOS): It may be hard to dispatch an extensive scale DOS assault from a solitary host. Various hosts can be utilized to dispatch an assault.

  • 3.    Channel Jamming: Channel jamming can be referred to as a technology that is utilized by assailants to jam the wireless system and along these lines deny access to any authentic users in the system.

  • 4.    Unauthorized Access: If an appropriate strategy for confirmation or authentication is not conveyed then an assailant can acquire free access to a system and after that can utilize it for services that he was not accredited for. 

  • 5.    Eavesdropping: In case the traffic on the cellular wireless connection was not encrypted then an assailant can spy, eavesdrop and block all the sensitive correspondence, for example, private calls, delicate records and so forth. 

Security Mechanism

There are five diverse groups of structures available in the 3G architecture for providing security:

  • 1.    Network Access Security: This component empowers clients to get safely to benefits gave by the 3G system. This element is in charge of giving character privacy, verification of clients, integrity, confidentiality and cellular equipment authentication. Client Identity confidentiality can easily be obtained by utilizing an impermanent identifies which is known as called the International Mobile User Identity. Validation is accomplished utilizing a reaction test strategy utilizing a secret key. The confidentiality can be acquired by the method for a secret Cipher Key (CK) which is traded as a feature of the Authentication and Key Agreement Process (AKA). Next, the integrity is given utilizing an integrity calculation and an integrity key (IK). The identification of equipment can easily be made via the International Mobile Equipment Identifier (IMEI).

  • 2.    Network Domain Security: This component empowers nodes to present the domain of the provider for safely exchanging the signaling information, and counteract the attacks being made on the wired system.

  • 3.    User Domain Security: This component empowers a client to associate safely with the mobile stations.

  • 4.    Application Security: This component empowers the user for exchanging information and data among the in the user as well as the provider domain.

Future Work
Security can be regarded as an ever growing area of study. Something considered secure in today's generation might not be secure in future. The attackers, as well as the malicious users, will not be ceased in future. Hence, there is a growing need for considering the security issues for a secure and private future and hence controls these matters before they worsen further. (Gardezi, 2006)
•    Security Mechanisms
Various mechanisms have been introduced for enhancing the security to the systems that are available in the Wireless Cellular Networks. And various researches have been going on for providing innovative and highly secured mechanisms for imparting the cellular security. Some of them are listed below:

  • (a.)    A New Authentication Scheme with Anonymity for Wireless Networks: The users must be provided with anonymity when the mobile users are in the roaming region. This would help the mobile users not to be associated with the attacks or the malicious users. This can be done by providing a temporary identity or TID to the users instead of their real identity. There are a plethora of matters to be taken into considerations while designing the protocol for the security of the wireless cellular networks. First, they should have an inadequate computational power. Secondly, the wireless networks have the higher error rate of texts as compared to the cellular networks. Thus, there is a dire need for implementation of the mechanism that can minimize the size of the message so that the error rates can decline.

  • (b.) Manual Authentication for Wireless Devices: This method is useful for authenticating devices by the manual exchange of the information and the data among the devices. Thus, the user needs to enter the information as well as the data manually. The MAC algorithms have been employed for this kind of authentication. (Alomari, 2014)

  • (c.) Channel Surfing and Spatial Retreats: This type of method can help to reduce the DOS attacks. In that case, the adversary needs to fill the buffer into the network device, or they need to pass the layer of MAC and even try for jamming the channel. In this technique, the transmission frequency is altered to the frequency where the interference is absent. Whereas the spatial retreats are the technique were, the wireless user himself gets relocated to the place with no interference. (Xu, 2004)  

Conclusion

Cell innovation gives companies the capacity to broaden the limits of an\ communication infrastructure to untethered mobile clients. This paper depicted types of cellular devices, various generations of these cellular networks, safety issues, types of threats for wireless cellular devices,  equipment and programming necessities and dangers found in cell innovation. Individuals have likewise begun to look ahead at how new elements of the 4G system will influence security and what measures can be taken to include new security highlights furthermore enhance those that have been utilized in 4G. 

References

  • Andrews, J. Code Division Multiple Access for Wireless Communications (1st ed., p. 5). Austin: University of Texas at Austin. Retrieved from http://users.ece.utexas.edu/~jandrews/publications/cdma_talk.pdf

  • Falconer, D., Adachi, F., & Gudmundson, B. (1995). Time division multiple access methods for wireless personal communications. IEEE Commun. Mag., 33(1), 50-57. http://dx.doi.org/10.1109/35.339881

  • Gardezi, A. (2006). Security In Wireless Cellular Networks (1st ed., p. 10). Retrieved from http://www.cse.wustl.edu/~jain/cse574-06/ftp/cellular_security.pdf

  • Generations of Wireless Network : 1G, 2G, 3G & 4G - Mobile Computing. I. T. Engg Portal. Retrieved 20 March 2016, from http://twww.itportal.in/2011/10/generations-of-wireless-network-1g-4g.html

  • GSM (Global System for Mobile Communications). Global Telecoms Insight. Retrieved 20 March 2016, from http://www.mobilecomms-technology.com/projects/gsm/

  • Integrated Digital Enhanced Network (1st ed., p. 5). Retrieved from https://www.eff.org/files/filenode/integrated_digital_enhanced_network.pdf

  • Karthik, K. (2015). SECURITY IN WIRELESS CELLULAR NETWORKS. International Journal Of Application Or Innovation In Engineering & Management (IJAIEM), 4(4), 196.

  • Xu, W. (2004). Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service (1st ed., p. 81). USA: Wireless Information Network Laboratory (WINLAB). Retrieved from http://www.winlab.rutgers.edu/~trappe/Papers/WiDoS_Wise04.pdf

  • Alomari, A. (2014). Mutual Authentication and Updating the Authentication Key in MANETS. Wireless Pers Commun, 81(3), 1031-1043. http://dx.doi.org/10.1007/s11277-014-2169-1

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order