Matches in SemOpenAlex for { <https://semopenalex.org/work/W2121235028> ?p ?o ?g. }
Showing items 1 to 68 of
68
with 100 items per page.
- W2121235028 abstract "Summary form only given. Telecommunication networks are evolving from closed systems with limited, standardized services, to open systems which will allow great creativity in building and deploying new services. These systems will heavily leverage Internet technology in an effort to create this open environment. This evolution is being aggressively pursued by wireless service providers (WSPs). Along with the benefits of these networks come increasingly high risks of a variety of attacks that may compromise security. Current, so called second generation (2G) wireless telecommunication networks are implemented using standardized control protocols for user and device authentication, mobility management, session control and services control. These networks are closed in the sense that control messages are exchanged on a private packet-switched network based on the signaling system No. 7 standards. Because of their closed nature, there are few successful attacks on these networks. The next, so called third generation (3G) wireless telecommunication networks are migrating towards IP technology, with the ultimate goal being an all-IP network. Standards for these systems, called the IP multimedia subsystem (IMS) are being defined by the third generation partnership projects (3GPP and 3GPP2). These networks will use IP for transport of information, and Internet protocols such as the session initiation protocol (SIP) and mobile IP, for session control and mobility management. These networks open the possibility for IP-based services and must interwork with 2G networks. Because new services will be introduced in the IP-domain of these networks, new attacks on 3G networks are possible. Because IP networks are more accessible than SS7 networks, the control portion of the 3G networks is now more vulnerable to attack. These attacks may be remote denial of service attacks, or attacks that target the integrity of specific services. The means of the attack may vary depending on the interworking model used and the service being offered. In this talk we discuss the different security risks in IP-based 3G networks, different attack types, and the trade-offs of high performance, open network architectures versus secure network infrastructure." @default.
- W2121235028 created "2016-06-24" @default.
- W2121235028 creator A5042993615 @default.
- W2121235028 date "2006-10-11" @default.
- W2121235028 modified "2023-09-27" @default.
- W2121235028 title "Security and ip-based 3G wireless networks" @default.
- W2121235028 doi "https://doi.org/10.1109/icccn.2005.1523849" @default.
- W2121235028 hasPublicationYear "2006" @default.
- W2121235028 type Work @default.
- W2121235028 sameAs 2121235028 @default.
- W2121235028 citedByCount "0" @default.
- W2121235028 crossrefType "proceedings-article" @default.
- W2121235028 hasAuthorship W2121235028A5042993615 @default.
- W2121235028 hasConcept C108037233 @default.
- W2121235028 hasConcept C110875604 @default.
- W2121235028 hasConcept C110994511 @default.
- W2121235028 hasConcept C136764020 @default.
- W2121235028 hasConcept C26878273 @default.
- W2121235028 hasConcept C2778555145 @default.
- W2121235028 hasConcept C31258907 @default.
- W2121235028 hasConcept C38652104 @default.
- W2121235028 hasConcept C41008148 @default.
- W2121235028 hasConcept C41878487 @default.
- W2121235028 hasConcept C5119721 @default.
- W2121235028 hasConcept C555944384 @default.
- W2121235028 hasConcept C76155785 @default.
- W2121235028 hasConcept C93996380 @default.
- W2121235028 hasConceptScore W2121235028C108037233 @default.
- W2121235028 hasConceptScore W2121235028C110875604 @default.
- W2121235028 hasConceptScore W2121235028C110994511 @default.
- W2121235028 hasConceptScore W2121235028C136764020 @default.
- W2121235028 hasConceptScore W2121235028C26878273 @default.
- W2121235028 hasConceptScore W2121235028C2778555145 @default.
- W2121235028 hasConceptScore W2121235028C31258907 @default.
- W2121235028 hasConceptScore W2121235028C38652104 @default.
- W2121235028 hasConceptScore W2121235028C41008148 @default.
- W2121235028 hasConceptScore W2121235028C41878487 @default.
- W2121235028 hasConceptScore W2121235028C5119721 @default.
- W2121235028 hasConceptScore W2121235028C555944384 @default.
- W2121235028 hasConceptScore W2121235028C76155785 @default.
- W2121235028 hasConceptScore W2121235028C93996380 @default.
- W2121235028 hasLocation W21212350281 @default.
- W2121235028 hasOpenAccess W2121235028 @default.
- W2121235028 hasPrimaryLocation W21212350281 @default.
- W2121235028 hasRelatedWork W116140079 @default.
- W2121235028 hasRelatedWork W143205523 @default.
- W2121235028 hasRelatedWork W1522600426 @default.
- W2121235028 hasRelatedWork W1573239918 @default.
- W2121235028 hasRelatedWork W2085772875 @default.
- W2121235028 hasRelatedWork W2161838354 @default.
- W2121235028 hasRelatedWork W2185717069 @default.
- W2121235028 hasRelatedWork W2322440073 @default.
- W2121235028 hasRelatedWork W2395155848 @default.
- W2121235028 hasRelatedWork W2431386555 @default.
- W2121235028 hasRelatedWork W2556191930 @default.
- W2121235028 hasRelatedWork W2902632384 @default.
- W2121235028 hasRelatedWork W3014983515 @default.
- W2121235028 hasRelatedWork W3047658196 @default.
- W2121235028 hasRelatedWork W3111042009 @default.
- W2121235028 hasRelatedWork W3149411306 @default.
- W2121235028 hasRelatedWork W3182671565 @default.
- W2121235028 hasRelatedWork W3205417460 @default.
- W2121235028 hasRelatedWork W585176043 @default.
- W2121235028 hasRelatedWork W1955578268 @default.
- W2121235028 isParatext "false" @default.
- W2121235028 isRetracted "false" @default.
- W2121235028 magId "2121235028" @default.
- W2121235028 workType "article" @default.