METHODS FOR ENSURING DATA SECURITY IN MOBILE STANDARDS
Serhii Moroz
Lutsk National Technical University, Faculty of Computer and Information Technologies, Department of Electronics and Telecommunications (Ukraine)
https://orcid.org/0000-0003-4677-5170
Anatolii Tkachuk
a.tkachuk@lntu.edu.uaLutsk National Technical University, Faculty of Computer and Information Technologies, Department of Electronics and Telecommunications (Ukraine)
https://orcid.org/0000-0001-9085-7777
Mykola Khvyshchun
Lutsk National Technical University, Faculty of Computer and Information Technologies, Department of Electronics and Telecommunications (Ukraine)
https://orcid.org/0000-0002-3918-4527
Stanislav Prystupa
Lutsk National Technical University, Faculty of Computer and Information Technologies, Department of Electronics and Telecommunications (Ukraine)
https://orcid.org/0000-0003-3705-1541
Mykola Yevsiuk
Lutsk National Technical University, Faculty of Computer and Information Technologies, Department of Electronics and Telecommunications (Ukraine)
https://orcid.org/0000-0002-3768-8959
Abstract
The analysis of mobile communication standards is carried out, the functional structure and interfaces of interaction between the structural elements of the cellular network are considered. To understand the principle of communication according to the GSM standard, a block diagram of a mobile switching center (MSC), base station equipment (BSS), control and service center (MCC), mobile stations (MS) is presented. The main algorithms for ensuring the confidentiality and security of mobile subscribers' data, in different types of standards, as well as the vulnerabilities of information flows are considered. In particular, the following dangerous types of attacks have been identified, to which mobile network subscribers are sensitive: sniffing; leakage of personal data; leakage of geolocation data; spoofing; remote capture of SIM-card, execution of arbitrary code (RCE); denial of service (DoS). It is established that the necessary function of the mobile network is the identification of subscribers, which is performed by IMSI, which is recorded in the SIM card of the subscriber and the HLR of the operator. To protect against spoofing, the network authenticates the subscriber before starting its service. In the case of subscriber identification, the subscriber and the network operator are protected from the effects of fraudulent access. In addition, the user must be protected from eavesdropping. This is achieved by encrypting the data transmitted over the radio interface. Thus, user authentication in UMTS, as well as in the GSM network, is carried out using encryption with a common key using the "hack-response" protocol (the authenticating party sends a random number to the authenticated party, which encrypts it according to a certain algorithm using a common key and returns the result back).
Keywords:
Mobile Communication, Radio Communication Equipment, Encryption, AuthenticationReferences
Al-Tawil K., Akrami A.: A new authentication protocol for roaming users in GSM networks. Proceedings IEEE International Symposium on Computers and Communications (Cat. No. PR00250) 1999, 93–99, [http://doi.org/10.1109/ISCC.1999.780775].
DOI: https://doi.org/10.1109/ISCC.1999.780775
Google Scholar
Bakhovskyy P. et al.: Stages of the Virtual Technical Functions Concept Networks Development. D. Cagáˇnová et al. (eds.), Advances in Industrial Internet of Things, Engineering and Management. EAI, Springer Innovations in Communication and Computing, 2021, 119–135 [http://doi.org/10.1007/978-3-030-69705-1_7].
DOI: https://doi.org/10.1007/978-3-030-69705-1_7
Google Scholar
Cai Y. et al.: Modulation and Multiple Access for 5G Networks. IEEE Communications Surveys & Tutorials 20(1), 2018, 629–646, [http://doi.org/10.1109/COMST.2017.2766698].
DOI: https://doi.org/10.1109/COMST.2017.2766698
Google Scholar
Chen W. et al.: NFC Mobile Transactions and Authentication Based on GSM Network. Second International Workshop on Near Field Communication, 2010, 83–89, [http://doi.org/10.1109/NFC.2010.15].
DOI: https://doi.org/10.1109/NFC.2010.15
Google Scholar
Deng L. et al.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Cluster Comput 22, 2019, 9889–9904 [http://doi.org/10.1007/s10586-018-1847-2].
DOI: https://doi.org/10.1007/s10586-018-1847-2
Google Scholar
Gupta A., Jha R. K.: A Survey of 5G Network: Architecture and Emerging Technologies. IEEE Access 3, 2015, 1206–1232, [http://doi.org/10.1109/ACCESS.2015.2461602].
DOI: https://doi.org/10.1109/ACCESS.2015.2461602
Google Scholar
Hongfeng Z. et al.: A Novel and Provable Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps towards Mobile Network. International Journal of Network Security 18(1), 2016, 116–123.
Google Scholar
Melnyk V. et al.: Design and implementation of interdomain communication mechanism for high performance data processing. Eastern-European Journal of Enterprise Technologies 1(9), 2016, 10–15, [http://doi.org/10.15587/1729-4061.2016.60629].
DOI: https://doi.org/10.15587/1729-4061.2016.60629
Google Scholar
Melnyk V. et al.: Implementation of the simplified communication mechanism in the cloud of high performance computations. Eastern-European Journal of Enterprise Technologies 2(86), 2017, 24–32, [http://doi.org/10.15587/1729-4061.2017.98896].
DOI: https://doi.org/10.15587/1729-4061.2017.98896
Google Scholar
Pekh P. et al.: Generators of Some Kinds Random Erlang Numbers and Estimation of Their Complexity. 10th International Conference on Advanced Computer Information Technologies, ACIT 2020, 306–310, [http://doi.org/10.1109/ACIT49673.2020.9208831].
DOI: https://doi.org/10.1109/ACIT49673.2020.9208831
Google Scholar
Pham Q. et al.: A Survey of Multi-Access Edge Computing in 5G and Beyond: Fundamentals, Technology Integration, and State-of-the-Art. IEEE Access 8, 2020, 116974–117017, [http://doi.org/10.1109/ACCESS.2020.3001277].
DOI: https://doi.org/10.1109/ACCESS.2020.3001277
Google Scholar
Ren Y. et al.: Dynamic Auto Scaling Algorithm (DASA) for 5G Mobile Networks. 2016 IEEE Global Communications Conference (GLOBECOM), 2016, 1–6, [http://doi.org/10.1109/GLOCOM.2016.7841759].
DOI: https://doi.org/10.1109/GLOCOM.2016.7841759
Google Scholar
Růzičková M. et al.: The estimation of the dynamics of indirect control switching systems. Tatra Mountains Mathematical Publications 48(1), 2011, 197–213, [http://doi.org/10.2478/v10127-011-0018-0].
DOI: https://doi.org/10.2478/v10127-011-0018-0
Google Scholar
Saad W. et al.: A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems. IEEE Network 34(3), 2020, 134–142, [http://doi.org/10.1109/MNET.001.1900287].
DOI: https://doi.org/10.1109/MNET.001.1900287
Google Scholar
Satsyk, V. et al.: Reduction of Server Load by Means of CMS Drupal. 10th International Conference on Advanced Computer Information Technologies ACIT 2020, 523–528, [http://doi.org/10.1109/ACIT49673.2020.9208874].
DOI: https://doi.org/10.1109/ACIT49673.2020.9208874
Google Scholar
Shafi M. et al.: 5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice. IEEE Journal on Selected Areas in Communications 35(6), 2017, 1201–1221, [http://doi.org/10.1109/JSAC.2017.2692307].
DOI: https://doi.org/10.1109/JSAC.2017.2692307
Google Scholar
Tkachuk A. et al.: Basic Stations Work Optimization in Cellular Communication Network. D. Cagánová et al. (eds.), Advances in Industrial Internet of Things, Engineering and Management. EAI, Springer Innovations in Communication and Computing 2021, 1–19 [http://doi.org/10.1007/978-3-030-69705-1_1].
DOI: https://doi.org/10.1007/978-3-030-69705-1_1
Google Scholar
Toroshanko Y. et al.: Control of Traffic Streams with the Multi-Rate Token Bucket. International Conference on Advanced Information and Communications Technologies – AICT 2019, 352–355, [http://doi.org/10.1109/AIACT.2019.8847860].
DOI: https://doi.org/10.1109/AIACT.2019.8847860
Google Scholar
Wu L., Lin Y.: Authentication Vector Management for UMTS. IEEE Transactions on Wireless Communications 6(11), 2007, 4101–4107, [http://doi.org/10.1109/TWC.2007.060245].
DOI: https://doi.org/10.1109/TWC.2007.060245
Google Scholar
Xu L. et al.: A Comprehensive Operation and Revenue Analysis Algorithm for LTE/5G Wireless System Based on Telecom Operator Data. IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, 2019, 1521–1524, [http://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00274].
DOI: https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00274
Google Scholar
Zhang Y., Fujise M.: An improvement for authentication protocol in third-generation wireless networks. IEEE Transactions on Wireless Communications 5(9), 2006, 2348–2352, [http://doi.org/10.1109/TWC.2006.1687756].
DOI: https://doi.org/10.1109/TWC.2006.1687756
Google Scholar
Authors
Serhii MorozLutsk National Technical University, Faculty of Computer and Information Technologies, Department of Electronics and Telecommunications Ukraine
https://orcid.org/0000-0003-4677-5170
Authors
Anatolii Tkachuka.tkachuk@lntu.edu.ua
Lutsk National Technical University, Faculty of Computer and Information Technologies, Department of Electronics and Telecommunications Ukraine
https://orcid.org/0000-0001-9085-7777
Authors
Mykola KhvyshchunLutsk National Technical University, Faculty of Computer and Information Technologies, Department of Electronics and Telecommunications Ukraine
https://orcid.org/0000-0002-3918-4527
Authors
Stanislav PrystupaLutsk National Technical University, Faculty of Computer and Information Technologies, Department of Electronics and Telecommunications Ukraine
https://orcid.org/0000-0003-3705-1541
Authors
Mykola YevsiukLutsk National Technical University, Faculty of Computer and Information Technologies, Department of Electronics and Telecommunications Ukraine
https://orcid.org/0000-0002-3768-8959
Statistics
Abstract views: 346PDF downloads: 247
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Most read articles by the same author(s)
- Mykola Polishchuk, Serhii Grinyuk, Serhii Kostiuchko, Anatolii Tkachuk, Pavlo Savaryn, TESLA SWITCH OF 4 BATTERIES BASED ON THE ARDUINO UNO BOARD , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 13 No. 3 (2023)
- Valentyn Zablotskyi, Yosyp Selepyna, Viktor Lyshuk, Natalia Yakymchuk, Anatolii Tkachuk, METHOD FOR EVALUATION QUALITY PARAMETERS OF TELECOMMUNICATIONS SERVICES , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 12 No. 2 (2022)
- Olena Liutak, Olena Baula, Anatolii Tkachuk, SIMULATION OF THE INFLUENCE OF INVESTMENT AND INNOVATION ACTIVITIES ON ENSURING THE INTERNATIONAL COMPETITIVENESS OF COUNTRIES , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 13 No. 2 (2023)
- Valeriy Kozlovskiy, Natalia Yakymchuk, Yosyp Selepyna, Serhii Moroz, Anatolii Tkachuk, DEVELOPMENT OF A MODIFIED METHOD OF NETWORK TRAFFIC FORMING , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 13 No. 1 (2023)
- Viktor Lyshuk, Vasyl Tchaban, Anatolii Tkachuk, Valentyn Zablotskyi, Yosyp Selepyna, ЕLECTROMAGNETIC FIELD EQUATIONS IN NONLINEAR ENVIRONMENT , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 14 No. 1 (2024)
- Natalia Yakymchuk, Yosyp Selepyna, Mykola Yevsiuk, Stanislav Prystupa, Serhii Moroz, MONITORING OF LINK-LEVEL CONGESTION IN TELECOMMUNICATION SYSTEMS USING INFORMATION CRITERIA , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 12 No. 4 (2022)