Browse wiki

Jump to: navigation, search
Mobile network security
Course TEK5500  +
Keywords NMT  + , GSM  + , UMTS  + , LTE  + , Network Security  + , Mobile Security  +
Learning outcomes Having followed the lecture, you * will beHaving followed the lecture, you * will be able to explain a security architecture of a mobile system * mention threats being relevant for mobile systems * can point to the principle differences between the security elements of NMT, GSM, UMTS and LTE * can describe the importance of the SIM card for the security architecture of GSM and UMTS * know why a user can get a new SIM card, but keep his mobile phone number. * can point our the main functionality of the three major security algorithms A3, A5 and A8 * explain why the A5 algorithm exists in various formsy the A5 algorithm exists in various forms  +
Lecturer Josef Noll  +
Objective This lecture will provide details of the security architecture of mobile systems, from NMT, GSM, UMTS to LTE.  +
References Dieter Gollmann, "Computer Security", Ch. 19. http://www.wiley.com/college/gollmann  +
Time 0915-1200  +
Title Mobile network security  +
Creation dateThis property is a special property in this wiki. 25 April 2013 01:56:09  +
Categories UNIK4250  + , Lecture  +
Modification dateThis property is a special property in this wiki. 17 April 2015 10:17:21  +
DateThis property is a special property in this wiki. 17 April 2015  +
hide properties that link here 
  No properties link to this page.
 

 

Enter the name of the page to start browsing from.