SlideShare a Scribd company logo
Security In Wireless
Cellular Networks
Group Member
 M.Waqas 0050
 Awais Mansoor 0064
 M.Basharat 0121
 M.Rizwan 0081
1. Introduction
 Cellular Communication has become an important part
of our daily life. Besides using cell phones for voice
communication, we are now able to access the Internet,
conduct monetary transactions, send text messages etc.
using our cell phones, and new services continue to be
added. However, the wireless medium has certain
limitations over the wired medium such as open access,
limited bandwidth and systems complexity. These
limitations make it difficult although possible to provide
security features such as authentication, integrity and
confidentiality.
2.Generations Of Cellular
Networks
 1G:-A term never widely used until 2G was
available. This was the first generation of cell
phone technology. Simple phone calls were all
it was able to do.
 2G:- the first digital cellular systems launched
early 1990s, offering improved sound quality,
better security and higher total capacity.
 3G:-3G is the next generation wireless
cellular network whose aim is to provide a
world wide standard and a common frequency
band for mobile networking.
 4G:-The speed and standards of this
technology of wireless needs to be at least
100 Megabits per second and up to 1 Gigabit
per second to pass as 4G. It also needs to
share the network resources to support more
simultaneous connections on the cell.
3. Security Issues In Cellular
Networks
 The infrastructure for Cellular Networks is
massive, complex with multiple entities
coordinating together, such as the IP Internet
coordinating with the core network. And
therefore it presents a challenge for the network
to provide security at every possible
communication path.
3.1Limitations Of Cellular
Networks
Compared to Wired Networks, Wireless Cellular
Networks have a lot of limitations.
 Open Wireless Access Medium: Since the
communication is on the wireless channel, there is
no physical barrier that can separate an attacker
from the network.
 Limited Bandwidth: Although wireless bandwidth
is increasing continuously, because of channel
contention everyone has to share the medium.
 Limited Power: Wireless Systems consume a lot
of power and therefore have a limited time battery
life.
 Limited Processing Power: The processors
installed on the wireless devices are increasing in
power, but still they are not powerful enough to
carry out intensive processing.
 Relatively Unreliable Network Connection: The
wireless medium is an unreliable medium with a
high rate of errors compared to a wired network.
3.2 Security Issues In Cellular
Networks
 There are several security issues that are given
below:
 Authentication: Cellular networks have a large
number of subscribers, and each has to be
authenticated to ensure the right people are using
the network. Since the purpose of 3G is to enable
people to communicate from anywhere in the
world, the issue of cross region and cross provider
authentication becomes an issue.
 Integrity: With services such as SMS, chat and file
transfer it is important that the data arrives without
any modifications.
 Confidentiality: With the increased use of
cellular phones in sensitive communication,
there is a need for a secure channel in order to
transmit information.
 Web Services: A Web Service is a component
that provides functionality accessible through
the web using the standard HTTP Protocol.
This opens the cellular device to variety of
security issues such as viruses, buffer
overflows, denial of service attacks etc.
 Downloaded Contents: Spyware or Adware
might be downloaded causing security issues.
Another problem is that of digital rights
management. Users might download
unauthorized copies of music, videos, wallpapers
and games.
 Device Security: If a device is lost or stolen, it
needs to be protected from unauthorized use so
that potential sensitive information such as
emails, documents, phone numbers etc. cannot
be accessed.
3.3 Types Of Attacks
 Unauthorized Access: If a proper method of
authentication is not deployed then an
attacker can gain free access to a network
and then can use it for services that he might
not be authorized for.
 Eavesdropping: If the traffic on the wireless
link is not encrypted then an attacker can
eavesdrop and intercept sensitive
communication such as confidential calls,
sensitive documents etc.
 Message Forgery: If the communication
channel is not secure, then an attacker can
intercept messages in both directions and
change the content without the users ever
knowing.
 Man In The Middle Attack: An attacker can
sit in between a cell phone and an access
station and intercept messages in between
them and change them.
Summary
 Cellular Networks are open to attacks such as DOS,
channel jamming, message forgery etc. Therefore, it is
necessary that security features are provided that
prevent such attacks. The 3G security architecture
provides features such as authentication, confidentiality,
integrity etc. Also, the WAP protocol makes use of
network security layers such as TLS/WTLS/SSL to
provide a secure path for HTTP communication.
Although 3G provides good security features, there are
always new security issues that come up and
researchers are actively pursuing new and improved
solutions for these issues. People have also started
looking ahead at how new features of the 4G network
infrastructure will affect security and what measures can
be taken to add new security features and also improve
upon those that have been employed in 3G.

More Related Content

PPTX
Cellular wireless network security
PPTX
Unit-3.pptx
PPTX
IP Spoofing
PPTX
Firewalls and packet filters
PPTX
Network security
PPT
Keyloggers and Spywares
PDF
Network Security Fundamentals
PPTX
Network security
Cellular wireless network security
Unit-3.pptx
IP Spoofing
Firewalls and packet filters
Network security
Keyloggers and Spywares
Network Security Fundamentals
Network security

What's hot (20)

PPTX
Wireless network security
PPSX
Mobile ip overview
PPS
Ip address
PPTX
IP classes
PPTX
Wireless LAN technologies
PPTX
Wireless Network security
PPT
Circuit and packet_switching
PPTX
Introduction to 3G technology
PPTX
Network defenses
PDF
Important questions on mobile computing
PPTX
firewall and its types
PPTX
Network security
PPTX
Subnetting Presentation
PDF
Mobile computing (Wireless) Medium Access Control (MAC)
PPTX
Basic Concepts in Wireless LAN
PDF
Mobile computing notes and material
PPTX
Network address translation
Wireless network security
Mobile ip overview
Ip address
IP classes
Wireless LAN technologies
Wireless Network security
Circuit and packet_switching
Introduction to 3G technology
Network defenses
Important questions on mobile computing
firewall and its types
Network security
Subnetting Presentation
Mobile computing (Wireless) Medium Access Control (MAC)
Basic Concepts in Wireless LAN
Mobile computing notes and material
Network address translation
Ad

Viewers also liked (19)

PPT
PPTX
WIFI Introduction (PART I)
PDF
FreeG WiFi Introduction
PPTX
ZigBee Technology
PPTX
Zigbee technology
PDF
Wireless Fidelity (WiFi)
PDF
WiFi For Beginners Module 2 - RF Basics
PPTX
Gsm security and encryption
PPT
Cellular networks
PPTX
Cellular network
PPTX
PPT
Geostationary Satellite
PPTX
Introduction to satellite communication
PPTX
Mobile security
PPT
Cellular network presentation
PPT
Satellite communications
PPT
Satellites presentation
PPTX
Zigbee Presentation
PPT
Network security
WIFI Introduction (PART I)
FreeG WiFi Introduction
ZigBee Technology
Zigbee technology
Wireless Fidelity (WiFi)
WiFi For Beginners Module 2 - RF Basics
Gsm security and encryption
Cellular networks
Cellular network
Geostationary Satellite
Introduction to satellite communication
Mobile security
Cellular network presentation
Satellite communications
Satellites presentation
Zigbee Presentation
Network security
Ad

Similar to Security in wireless cellular network (20)

PDF
Comprehensive survey of possible
PDF
Wireless networks security
PDF
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
PDF
PPTX
A Survey On Wireless security
PDF
Security Models in Cellular Wireless Networks
PPT
wireless.ppt
PDF
lecture_01_introduction to wireless networks.pdf
PPTX
Security Issues for Cellular Telephony
PPTX
Wireless Communiction Security
DOCX
Security model evaluation of 3 g wireless network1 paper presentation
PPT
security of the information and the technoogy
PPTX
asdas dwasdasf adasdasasdasd asdasdasdasdqwq
PPTX
Mobile computing security
PDF
A Literature Survey on Security Management Policies used in Wireless Domain
PPTX
Security management systemofcellular_communication
PPT
Issues in mobile communication
PPTX
Security model evaluation of 3 g
PPT
4g security presentation
PPT
Wireless communication
Comprehensive survey of possible
Wireless networks security
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
A Survey On Wireless security
Security Models in Cellular Wireless Networks
wireless.ppt
lecture_01_introduction to wireless networks.pdf
Security Issues for Cellular Telephony
Wireless Communiction Security
Security model evaluation of 3 g wireless network1 paper presentation
security of the information and the technoogy
asdas dwasdasf adasdasasdasd asdasdasdasdqwq
Mobile computing security
A Literature Survey on Security Management Policies used in Wireless Domain
Security management systemofcellular_communication
Issues in mobile communication
Security model evaluation of 3 g
4g security presentation
Wireless communication

Recently uploaded (20)

PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Computing-Curriculum for Schools in Ghana
PDF
Pre independence Education in Inndia.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Cell Structure & Organelles in detailed.
PDF
01-Introduction-to-Information-Management.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
Basic Mud Logging Guide for educational purpose
PDF
O7-L3 Supply Chain Operations - ICLT Program
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
TR - Agricultural Crops Production NC III.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Microbial diseases, their pathogenesis and prophylaxis
Sports Quiz easy sports quiz sports quiz
Computing-Curriculum for Schools in Ghana
Pre independence Education in Inndia.pdf
PPH.pptx obstetrics and gynecology in nursing
VCE English Exam - Section C Student Revision Booklet
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
Cell Structure & Organelles in detailed.
01-Introduction-to-Information-Management.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Final Presentation General Medicine 03-08-2024.pptx
RMMM.pdf make it easy to upload and study
Basic Mud Logging Guide for educational purpose
O7-L3 Supply Chain Operations - ICLT Program

Security in wireless cellular network

  • 2. Group Member  M.Waqas 0050  Awais Mansoor 0064  M.Basharat 0121  M.Rizwan 0081
  • 3. 1. Introduction  Cellular Communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send text messages etc. using our cell phones, and new services continue to be added. However, the wireless medium has certain limitations over the wired medium such as open access, limited bandwidth and systems complexity. These limitations make it difficult although possible to provide security features such as authentication, integrity and confidentiality.
  • 4. 2.Generations Of Cellular Networks  1G:-A term never widely used until 2G was available. This was the first generation of cell phone technology. Simple phone calls were all it was able to do.  2G:- the first digital cellular systems launched early 1990s, offering improved sound quality, better security and higher total capacity.
  • 5.  3G:-3G is the next generation wireless cellular network whose aim is to provide a world wide standard and a common frequency band for mobile networking.  4G:-The speed and standards of this technology of wireless needs to be at least 100 Megabits per second and up to 1 Gigabit per second to pass as 4G. It also needs to share the network resources to support more simultaneous connections on the cell.
  • 6. 3. Security Issues In Cellular Networks  The infrastructure for Cellular Networks is massive, complex with multiple entities coordinating together, such as the IP Internet coordinating with the core network. And therefore it presents a challenge for the network to provide security at every possible communication path.
  • 7. 3.1Limitations Of Cellular Networks Compared to Wired Networks, Wireless Cellular Networks have a lot of limitations.  Open Wireless Access Medium: Since the communication is on the wireless channel, there is no physical barrier that can separate an attacker from the network.  Limited Bandwidth: Although wireless bandwidth is increasing continuously, because of channel contention everyone has to share the medium.  Limited Power: Wireless Systems consume a lot of power and therefore have a limited time battery life.
  • 8.  Limited Processing Power: The processors installed on the wireless devices are increasing in power, but still they are not powerful enough to carry out intensive processing.  Relatively Unreliable Network Connection: The wireless medium is an unreliable medium with a high rate of errors compared to a wired network.
  • 9. 3.2 Security Issues In Cellular Networks  There are several security issues that are given below:  Authentication: Cellular networks have a large number of subscribers, and each has to be authenticated to ensure the right people are using the network. Since the purpose of 3G is to enable people to communicate from anywhere in the world, the issue of cross region and cross provider authentication becomes an issue.  Integrity: With services such as SMS, chat and file transfer it is important that the data arrives without any modifications.
  • 10.  Confidentiality: With the increased use of cellular phones in sensitive communication, there is a need for a secure channel in order to transmit information.  Web Services: A Web Service is a component that provides functionality accessible through the web using the standard HTTP Protocol. This opens the cellular device to variety of security issues such as viruses, buffer overflows, denial of service attacks etc.
  • 11.  Downloaded Contents: Spyware or Adware might be downloaded causing security issues. Another problem is that of digital rights management. Users might download unauthorized copies of music, videos, wallpapers and games.  Device Security: If a device is lost or stolen, it needs to be protected from unauthorized use so that potential sensitive information such as emails, documents, phone numbers etc. cannot be accessed.
  • 12. 3.3 Types Of Attacks  Unauthorized Access: If a proper method of authentication is not deployed then an attacker can gain free access to a network and then can use it for services that he might not be authorized for.  Eavesdropping: If the traffic on the wireless link is not encrypted then an attacker can eavesdrop and intercept sensitive communication such as confidential calls, sensitive documents etc.
  • 13.  Message Forgery: If the communication channel is not secure, then an attacker can intercept messages in both directions and change the content without the users ever knowing.  Man In The Middle Attack: An attacker can sit in between a cell phone and an access station and intercept messages in between them and change them.
  • 14. Summary  Cellular Networks are open to attacks such as DOS, channel jamming, message forgery etc. Therefore, it is necessary that security features are provided that prevent such attacks. The 3G security architecture provides features such as authentication, confidentiality, integrity etc. Also, the WAP protocol makes use of network security layers such as TLS/WTLS/SSL to provide a secure path for HTTP communication. Although 3G provides good security features, there are always new security issues that come up and researchers are actively pursuing new and improved solutions for these issues. People have also started looking ahead at how new features of the 4G network infrastructure will affect security and what measures can be taken to add new security features and also improve upon those that have been employed in 3G.