Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Problem : 3G/4G

While GSM is ubiquitously deployed, 3rd and 4th generation technologies such as UMTS and LTS are wide spread today. This question explores some of the security aspects of 3G/4G systems, especially as they relate to GSM.

Universal Mobile Telecommunications System (UMTS) is a 3G system based on the GSM standard. The authentication and key agreement procedure in UMTS is similar to GSM, with some notable differences:

•The security algorithms and protocols used are negotiated between the operator and the mobile station during authentication.

•Both a cipher key and an integrity key are derived during authentication.

•In addition to the RAND challenge, the mobile network sends an AUTN message that contains a Message Authentication Code (MAC).

Research the UMTS authentication and key agreement (AKA) to answer the following questions:

(a) Briefly explain the purpose of the AUTN message.

(b) Assume Eve observes a < RAND, AUTN > pair for a particular IMSI during the device's authentication. What prevents an attacker from replaying this same < RAND, AUTN > pair? Explain your answer; you may need to examine the 3GPP UMTS spec and AUTN messages in more detail to answer.

(c) Xavier Breath believes that both the AUTN and the integrity-protected protocol negotiation messages are required to ensure mutual authentication and prevent Manin-the-Middle attacks. Explain why, or argue why not.

(d) Xavier further argues that the UMTS authentication protocol prevents downgrade attacks (for instance where the mobile station is instructed to use no encryption). Explain why Xavier is correct or incorrect.

Long Term Evolution (LTE) is a popular 4G system enjoying increased deployment.

(e) Briefly describe at least two differences between EPS-AKA (LTE's authentication and key agreement) and UMTS's AKA.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93091397

Have any Question?


Related Questions in Computer Network & Security

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: a. What is the network mask used by the router? (in dotted de ...

What is the difference between a positive economic

What is the difference between a positive economic statement and a normative one.

Lab activity investigate system backup and restore

Lab Activity: Investigate System Backup and Restore Tools Purpose: Assess and Document Tools to Backup and Restore the System Hard Drive for a Windows 8.1 Workstation. - Assess and document the use of a system backup too ...

Objectives-to learn about more advanced network security

Objectives -To learn about more advanced network security and vulnerability scanning tools Lab Outcome: · To complete the lab procedures & correctly answer the questions in the Blackboard quiz. Lab Deliverables · Answer ...

Two countries australia and france have their interest

Two Countries Australia and France have their interest rates to be 8% and 2 %, respectively. If their currencies trade according to 2 Australian $s buy one euro in the spot market, what will their future spot rate be in ...

Question suppose you work in a network security company and

Question: Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have ...

Assessment taskstarting from the logical network design

Assessment Task Starting from the logical network design that you completed in Assessment Item 1, you are required to undertake the physical design of the network taking into consideration the feedback that you received ...

Question a signal travels through an amplifier and its

Question : A signal travels through an amplifier, and its power increased and becomes doubled. Then calculate amplification for this condition 2 Discuss about the TCP/IP PROTOCOL SUITE and Principles of Protocol Layering ...

Assignment -need project made by packet truce follow the

Assignment - Need project made by packet Truce. Follow the given report and please don't make the project big and video will describe full project in details and with configuration. Project - Design and Implementation of ...

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As