SlideShare a Scribd company logo
Security Issues for Cellular Telephony
Dept. of Computer Science and Engineering
Hamdard University Bangladesh
Outlines
• Introduction
• Generations of Cellular Network
• First Generation (1G)
• Second Generation (2G) & 2.5G
• Third generation (3G)
• Fourth Generation (4G)
• Limitations of Cellular Networks
• Security Issues
• Types of Attacks
• Security Recommendations
02/14
Introduction
Cellular telephony is designed to provide communications
between
• two moving units, called mobile stations (MSs), or
• between one mobile unit and one stationary unit,
often called a land unit.
03/14
Generations of Cellular Networks
First generation (1G)
Second generation (2G)
2G And 2.5G
Third generation (3G)
Fourth Generation (4G)
Next Generation…
04/14
First Generation (1G)
Voice signal only
Analogue cellular phones
Advanced Mobile Phone System (AMPS) – US
Nordic Mobile Telephony (NMT) –
EUROPE (Nordic countries, Switzerland, Netherlands,
Eastern Europe and Russia)
05/14
Second Generation (2G)
Voice and data signals
Digital fidelity cellular phones
Global System for Mobile Communications(GSM)
Time Division Multiple Access(TDMA)
Code Division Multiple Access(CDMA)
06/14
2.5 G
Enhance 2G
Higher data rates
General Packet Radio Service(GPRS)
Enhanced Data rate for GSM Evolution(EDGE)
07/14
Third Generation (3G)
Voice, data and video signals
Video telephony/Internet surfing
Wideband CDMA(W-CDMA)
Universal Mobile Telecommunication System(UMTS)
08/14
Fourth Generation (4G)
Enhanced 3G/Interoperability protocol
High speed and IP-based
4G, Mobile IP
09/14
10/14
Limitations of Cellular Networks
Open Wireless Access Medium
Limited Bandwidth
System Complexity
Limited Power
Limited Processing Power
Relatively Unreliable Network Connection
11/14
Security Issues
Authentication
Integrity
Confidentiality
Access Control
Operating Systems In Mobile Devices
Web Services
Location Detection
Viruses And Malware
Downloaded Contents
Device Security
12/14
Types of Attacks
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
Channel Jamming
Unauthorized Access
Eavesdropping
Message Forgery
Message Replay
Man-in-the-Middle Attack
Session Hijacking
13/14
13/14
 Ensure that data stored in the mobile devices are encrypted and audited.
 Ensure that Mobile devices are configured with a power-on authentication to
prevent unauthorized access if lost or stolen.
 Ensure that anti-virus software is installed on the mobile devices.
 Ensure that firewall client is installed on the mobile devices.
 Ensure that Mobile devices are encrypted with strong password.
 Ensure that the data stored in the secondary storage such as Memory Sticks,
Data card, removable USB drive are also encrypted.
 Ensure that the mobile device policies are established in the organization and
the users are informed about the importance of policies and the means of
protecting their information.
 Ensure that periodic backups of mobile devices are done in data server.
Security Recommendations
 Lookout Mobile Security
 Snap Secure Mobile Security
 BullGuard Mobile Security 10
 McAfee Wave Secure
 Kaspersky Mobile Security 9
 F-Secure Mobile Security
 Avast! Mobile Security
 Norton Mobile Security Lite and so on…
Security Tools for Cellular Telephone
Security Issues for Cellular Telephony

More Related Content

PPSX
Wireless system
PPTX
Wireless communication , by Mulatu Gebeyeaw
PPTX
Metropolitan area network
PPTX
Firewall Design and Implementation
PPTX
Wireless and mobile security
PPTX
Presentation on wireless communication
PPTX
Wireless communication
PPTX
personal area network. ppt.pptx
Wireless system
Wireless communication , by Mulatu Gebeyeaw
Metropolitan area network
Firewall Design and Implementation
Wireless and mobile security
Presentation on wireless communication
Wireless communication
personal area network. ppt.pptx

What's hot (20)

PDF
WIRELESS NETWORKS - 4G & BEYOND
PDF
5G Interview Questions: 50 Questions on Spectrum
PPTX
Basic Concepts in Wireless LAN
PPT
Lan technologies
PPTX
Architecture of 5G technology
PDF
Lecture 23 27. quality of services in ad hoc wireless networks
PPTX
Network security
PPTX
Submarine cable
PPTX
Transmission media
PPTX
Firewall presentation
PPTX
Wireless LAN technologies
PPT
PPTX
Volte ppt
PDF
5G- System Network Architecture
PPT
Network layer tanenbaum
PPTX
Aruba WLANs 101 and design fundamentals
PPTX
Network Security
PPT
Modern trends in mobile communication
PPTX
Wireless Communication
PDF
Bluetooth Technology & Security
WIRELESS NETWORKS - 4G & BEYOND
5G Interview Questions: 50 Questions on Spectrum
Basic Concepts in Wireless LAN
Lan technologies
Architecture of 5G technology
Lecture 23 27. quality of services in ad hoc wireless networks
Network security
Submarine cable
Transmission media
Firewall presentation
Wireless LAN technologies
Volte ppt
5G- System Network Architecture
Network layer tanenbaum
Aruba WLANs 101 and design fundamentals
Network Security
Modern trends in mobile communication
Wireless Communication
Bluetooth Technology & Security
Ad

Similar to Security Issues for Cellular Telephony (20)

PDF
880 st011
PPTX
CS_UNIT 2(P3).pptx
PPT
The Consumerisation of Corporate IT
PPTX
Cellular wireless network security
PPTX
Mobile (in)security ?
PDF
Mobile (in)security? @ Mobile Edge '14
PPT
Mobile app Unit 1 best notes for students .ppt
PDF
Can You Steal From Me Now? Mobile and BYOD Security Risks
PDF
Cn35499502
PDF
B010331019
PPT
MOBILE SECURITY -UNIT -II PPT IV- PROFESSIONAL ELEFCTIVE
PDF
Important questions on mobile computing
PPT
UTM Unified Threat Management
PPTX
Network security
PPT
Comparative study of security hardware modules in VANET
PPTX
Chapter 3_Cyber Security-ccdf.pptx
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
Mobile Security Training, Mobile Device Security Training
DOCX
Wireless Security and Mobile DevicesChapter 12Princi.docx
PPT
Secure Mobile Working 1.0
880 st011
CS_UNIT 2(P3).pptx
The Consumerisation of Corporate IT
Cellular wireless network security
Mobile (in)security ?
Mobile (in)security? @ Mobile Edge '14
Mobile app Unit 1 best notes for students .ppt
Can You Steal From Me Now? Mobile and BYOD Security Risks
Cn35499502
B010331019
MOBILE SECURITY -UNIT -II PPT IV- PROFESSIONAL ELEFCTIVE
Important questions on mobile computing
UTM Unified Threat Management
Network security
Comparative study of security hardware modules in VANET
Chapter 3_Cyber Security-ccdf.pptx
CyberSecurity Mobile and Wireless Devices
Mobile Security Training, Mobile Device Security Training
Wireless Security and Mobile DevicesChapter 12Princi.docx
Secure Mobile Working 1.0
Ad

More from United International University (20)

PPT
Digital Devices (3rd chapter-2nd part)
PPTX
Network Topology (partial)
PPTX
Corona prediction from symptoms v1.4
PPTX
Introduction to Cloud Computing
PDF
ICT-Number system.সংখ্যা পদ্ধতি(৩য় অধ্যায়-১ম অংশ)
PDF
Wireshark Lab HTTP, DNS and ARP v7 solution
PDF
Wireshark lab ssl v7 solution
PPTX
Network Security(MD5)
PPTX
Secure Electronic Transaction
PPTX
Oracle installation
PPTX
IEEE 802.11 Project
PPT
SONET-Communication Engineering
PPTX
All types of model(Simulation & Modelling) #ShareThisIfYouLike
PPT
Type Checking(Compiler Design) #ShareThisIfYouLike
PPT
System imolementation(Modern Systems Analysis and Design)
PPTX
Making Complex Decisions(Artificial Intelligence)
PPTX
Free Space Management, Efficiency & Performance, Recovery and NFS
PPTX
Overview of Computer Graphics
PPT
Keyboard & Mouse basics
PPT
Organization of a computer
Digital Devices (3rd chapter-2nd part)
Network Topology (partial)
Corona prediction from symptoms v1.4
Introduction to Cloud Computing
ICT-Number system.সংখ্যা পদ্ধতি(৩য় অধ্যায়-১ম অংশ)
Wireshark Lab HTTP, DNS and ARP v7 solution
Wireshark lab ssl v7 solution
Network Security(MD5)
Secure Electronic Transaction
Oracle installation
IEEE 802.11 Project
SONET-Communication Engineering
All types of model(Simulation & Modelling) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLike
System imolementation(Modern Systems Analysis and Design)
Making Complex Decisions(Artificial Intelligence)
Free Space Management, Efficiency & Performance, Recovery and NFS
Overview of Computer Graphics
Keyboard & Mouse basics
Organization of a computer

Recently uploaded (20)

PDF
advance database management system book.pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Computer Architecture Input Output Memory.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Virtual and Augmented Reality in Current Scenario
advance database management system book.pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Share_Module_2_Power_conflict_and_negotiation.pptx
What if we spent less time fighting change, and more time building what’s rig...
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Hazard Identification & Risk Assessment .pdf
B.Sc. DS Unit 2 Software Engineering.pptx
Introduction to pro and eukaryotes and differences.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
My India Quiz Book_20210205121199924.pdf
Unit 4 Computer Architecture Multicore Processor.pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Computer Architecture Input Output Memory.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Virtual and Augmented Reality in Current Scenario

Security Issues for Cellular Telephony

  • 1. Security Issues for Cellular Telephony Dept. of Computer Science and Engineering Hamdard University Bangladesh
  • 2. Outlines • Introduction • Generations of Cellular Network • First Generation (1G) • Second Generation (2G) & 2.5G • Third generation (3G) • Fourth Generation (4G) • Limitations of Cellular Networks • Security Issues • Types of Attacks • Security Recommendations 02/14
  • 3. Introduction Cellular telephony is designed to provide communications between • two moving units, called mobile stations (MSs), or • between one mobile unit and one stationary unit, often called a land unit. 03/14
  • 4. Generations of Cellular Networks First generation (1G) Second generation (2G) 2G And 2.5G Third generation (3G) Fourth Generation (4G) Next Generation… 04/14
  • 5. First Generation (1G) Voice signal only Analogue cellular phones Advanced Mobile Phone System (AMPS) – US Nordic Mobile Telephony (NMT) – EUROPE (Nordic countries, Switzerland, Netherlands, Eastern Europe and Russia) 05/14
  • 6. Second Generation (2G) Voice and data signals Digital fidelity cellular phones Global System for Mobile Communications(GSM) Time Division Multiple Access(TDMA) Code Division Multiple Access(CDMA) 06/14
  • 7. 2.5 G Enhance 2G Higher data rates General Packet Radio Service(GPRS) Enhanced Data rate for GSM Evolution(EDGE) 07/14
  • 8. Third Generation (3G) Voice, data and video signals Video telephony/Internet surfing Wideband CDMA(W-CDMA) Universal Mobile Telecommunication System(UMTS) 08/14
  • 9. Fourth Generation (4G) Enhanced 3G/Interoperability protocol High speed and IP-based 4G, Mobile IP 09/14
  • 10. 10/14
  • 11. Limitations of Cellular Networks Open Wireless Access Medium Limited Bandwidth System Complexity Limited Power Limited Processing Power Relatively Unreliable Network Connection 11/14
  • 12. Security Issues Authentication Integrity Confidentiality Access Control Operating Systems In Mobile Devices Web Services Location Detection Viruses And Malware Downloaded Contents Device Security 12/14
  • 13. Types of Attacks Denial of Service (DoS) Distributed Denial of Service (DDoS) Channel Jamming Unauthorized Access Eavesdropping Message Forgery Message Replay Man-in-the-Middle Attack Session Hijacking 13/14
  • 14. 13/14  Ensure that data stored in the mobile devices are encrypted and audited.  Ensure that Mobile devices are configured with a power-on authentication to prevent unauthorized access if lost or stolen.  Ensure that anti-virus software is installed on the mobile devices.  Ensure that firewall client is installed on the mobile devices.  Ensure that Mobile devices are encrypted with strong password.  Ensure that the data stored in the secondary storage such as Memory Sticks, Data card, removable USB drive are also encrypted.  Ensure that the mobile device policies are established in the organization and the users are informed about the importance of policies and the means of protecting their information.  Ensure that periodic backups of mobile devices are done in data server. Security Recommendations
  • 15.  Lookout Mobile Security  Snap Secure Mobile Security  BullGuard Mobile Security 10  McAfee Wave Secure  Kaspersky Mobile Security 9  F-Secure Mobile Security  Avast! Mobile Security  Norton Mobile Security Lite and so on… Security Tools for Cellular Telephone