• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Security in Unlicensed Mobile Access

Eriksson, Martin January 2005 (has links)
<p>Unlicensed Mobile Access (UMA) provides transparent access to 2G and 3G networks for Mobile Stations over the unlicensed radio interface. Unlicensed radio tehnologies such as Bluetooth or WLAN technology connects the Mobile Station to the fixed IP network of the home or office and delivers high bandwith to the Mobile Station.</p><p>The purpose of this report is to examine if subscribers can feel as secure using UMA as they do when using any of the alternetive mobile technologies that UMA supports. The security evaluation is performed by first investigating the current security level of GSM, GPRS and UMTS and then compares them to the security mechanisms of UMA.</p><p>This evaluation noticed two distinct flaws in UMA that could compromise security. The conclusion is that these flaws do not have a major inpact and UMA does provide a general higher level of security than the 2G and 3G counterparts.</p>
2

Security in Unlicensed Mobile Access

Eriksson, Martin January 2005 (has links)
Unlicensed Mobile Access (UMA) provides transparent access to 2G and 3G networks for Mobile Stations over the unlicensed radio interface. Unlicensed radio tehnologies such as Bluetooth or WLAN technology connects the Mobile Station to the fixed IP network of the home or office and delivers high bandwith to the Mobile Station. The purpose of this report is to examine if subscribers can feel as secure using UMA as they do when using any of the alternetive mobile technologies that UMA supports. The security evaluation is performed by first investigating the current security level of GSM, GPRS and UMTS and then compares them to the security mechanisms of UMA. This evaluation noticed two distinct flaws in UMA that could compromise security. The conclusion is that these flaws do not have a major inpact and UMA does provide a general higher level of security than the 2G and 3G counterparts.

Page generated in 0.0776 seconds