Course
|
TEK5500 +
|
Keywords
|
NMT +
, GSM +
, UMTS +
, LTE +
, Network Security +
, Mobile Security +
|
Learning outcomes
|
Having followed the lecture, you
* will be … Having followed the lecture, you
* will be able to explain a security architecture of a mobile system
* mention threats being relevant for mobile systems
* can point to the principle differences between the security elements of NMT, GSM, UMTS and LTE
* can describe the importance of the SIM card for the security architecture of GSM and UMTS
* know why a user can get a new SIM card, but keep his mobile phone number.
* can point our the main functionality of the three major security algorithms A3, A5 and A8
* explain why the A5 algorithm exists in various formsy the A5 algorithm exists in various forms +
|
Lecturer
|
Josef Noll +
|
Objective
|
This lecture will provide details of the security architecture of mobile systems, from NMT, GSM, UMTS to LTE. +
|
References
|
Dieter Gollmann, "Computer Security", Ch. 19. http://www.wiley.com/college/gollmann +
|
Time
|
0915-1200 +
|
Title
|
Mobile network security +
|
Creation dateThis property is a special property in this wiki.
|
25 April 2013 01:56:09 +
|
Categories |
UNIK4250 +
, Lecture +
|
Modification dateThis property is a special property in this wiki.
|
17 April 2015 10:17:21 +
|
DateThis property is a special property in this wiki.
|
17 April 2015 +
|