SlideShare une entreprise Scribd logo
1  sur  27
CDMA SECURITY -AN INTELLIGENCE         GUIDED BY- PROF. BHARATI S. AINAPURE PRESENTED BY-MUKESH KUMAR
INTRODUCTION Wireless communication of  information. Originated from military applications  and cryptography. For military communications where information transmission heavily relies on wireless networks (for instance, from aircraft to aircraft, from aircraft to ground control center, etc.), security and reliability of the wireless communication systems is of number one priority, especially in national defense and emergency response to abrupt enemy attacks
SECURITY OVERVIEW Protecting corporate network assets is an on-going task for IT  professionals. Some of the top security issues:-      1).Unauthorizedsystems and network access.       2).Theft of intellectual property and confidential business information.        3).Internal and external sabotage .
NETWORK AND TECHNOLOGY OVERVIEW It has Same components and technology used in corporate network. Difference between these two is found only in the access network.In access network high security and access protocols become paramount.
CDMA2000 1xRTT AND 1xEV-DO More mobility , secure, high-speed access , and an extension of applications across the enterprise. Third-generation (3G) wireless networks, known as CDMA2000 The first phase of CDMA2000 is called 1xRTT.       a).Maximum theoretical data rates of 144 Kbps (downlink) and 144 Kbps (uplink) ,Excellent voice capacity .
CDMA2000 1xRTT AND 1xEV-DO Cdma2000  1xEV-DO Revision 0 (Rev. 0). a).Increases the downlink maximum theoretical data rate to 2.4 Mbps, with an average data rate between 400 and 700 Kbps. b).Supports Quality of Service (QoS) .        c).boosts the maximum theoretical uplink speed to 1.8 Mbps (average 500–800 Kbps).
ACCESS NETWORK Two types of access networks:- 1xRTT and 1xEV-DO . It is the mobile station’s entry point into the network . It maintains the communications link between the mobile station and the core network. It facilitates security by allowing only authorized mobile stations to access the network.
ELEMENTS OF ACCESS NETWORK The AN is composed of the following elements: - a).Base Transceiver Station:-physically composed of antennas and towers. b).Packet Control Function:-maintains the “connection state” between the access network and mobile stations. c).Radio Network Controller/Base Station Controller:-packet transmission on the air interface and manage connection between BTS’s.
ELEMENTS OF ACCESS NETWORK
CORE NETWORK Acts as the gateway between the access network and the Internet or enterprise private networks . It provides authentication, authorization, and accounting (AAA) services, provides access to network services, and manages IP addresses .
ELEMENTS OF CORE NETWORK The core network comprises the following elements:- a).PDSN/Foreign Agent:-The PDSN is the gateway between the access network and the core network. b).AAA/Home Agent:-The AAA and the home agent (HA) are used for authentication, authorization, and accounting for data services .
SECURITY-CDMA NETWORK The security protocols with CDMA-IS-41 networks are among the best in the industry.  By design, CDMA technology makes interpretation of data very difficult.  Unique to CDMA systems, is the 42-bit PN (Pseudo-Random Noise) Sequence called “Long Code” to scramble voice and data. On the forward link , data is scrambled at a rate of 19.2 Kilo symbols per second (Ksps) and on the reverse link, data is scrambled at a rate of 1.2288 Mega chips per second (Mcps).
SECURITY-CDMA NETWORK CDMA network security protocols rely on a 64-bit authentication key (A-Key) and the Electronic Serial Number (ESN) of the mobile . The key factor for CDMA network is:-      Authentication:-The mobile uses the SSD_A and the broadcast RAND* as inputs to generate an 18-bit authentication signature (AUTH_SIGNATURE), and sends it to the base station.
SECURITY-CDMA NETWORK Voice, Signalling, and Data Privacy:-The mobile uses the SSD_B and to generate a Private Long Code Mask(derived from an intermediate value called Voice Privacy Mask. By design, all CDMA guided devices use a unique PN (Pseudo-random Noise) code for spreading the signal, which makes it difficult for the signal to be intercepted.
Air Interface (Physical Layer) Mobile stations rely on radio technology to access the network.  Security is of concern when using radio technology, but with the advances in radio technology. So several air interface security mechanisms have been developed to keep signals secure while increasing access capability.
Air Interface Technologies Three types of technology :
Air Interface Security Benefits CDMA security works on (direct sequence spread spectrum)DSSS technology. DSSS technology employs techniques that deliberately distribute or “spread” data over a frequency domain. The low probability of interception, demodulation difficulty, and anti-jamming/interference benefits of DSSS.CDMA technologies are why the military has used it for so many years.                                    This is also why CDMA technology is inherently more secure than competing wireless technologies.
EXAMPLE : .These are four mutually orthogonal digital signals. .These vectors will be assigned to individual users and are called the "code", "chipping code" or "chip code
EXAMPLE : Each user is associated with a different code, sayv. ASSUMPTION: 1).If the data to be transmitted is a digital zero, then the actual bits transmitted will be –v. and,      2). if the data to be transmitted is a digital one, then the actual bits transmitted will be v.  .so If v=(1,–1), and the data that the user wishes to transmit is (1, 0, 1, 1) this would correspond to (v, –v, v, v) which is then constructed in binary as ((1,–1),(–1,1),(1,–1),(1,–1).
EXAMPLE If sender0 has code (1,–1) and data (1, 0, 1 ,1), and sender1 has code (1,1) and data (0,0,1,1), and both senders transmit simultaneously. Because signal0 and signal1 are transmitted at the same time into the air, they add to produce the raw signal:-(1,–1,–1,1,1,–1,1,–1) + (–1,–1,–1,–1,1,1,1,1) = (0,–2,–2,0,2,0,2,0).
EXAMPLE: DECODER SIDE ENCODER SIDE
Efficient Practical utilization of Fixed Frequency Spectrum. Flexible Allocation of Resources Privacy protection in CDMA due to anti-jamming capabilities of PN sequences We can change somewhat the flow rate of voice and signal by knowing the ESN AND MIN. ADVANTAGE AND WEAKNESS ADVANTAGE  WEAKNESS
FUTURE AND RESEARCH Continue work on verifying composition of security tunnels Currently thinking about attacks  so now a days AES algorithm is used. Add the capability to reuse tunnels. seemed easy at first, but may require some major restructuring                                 of the design.
RESEARCH plan iRespond is a device that will provide an immediate response to a certain location.
Conclusion It provides secure wireless  communication. Its uplink and downlink communication , make it better  than others. It is hard to detect , decode. Technology makes it better than other. It is better , but it is still secondary.
REFERENCES Viterbi, Andrew J. (1995). CDMA: Principles of Spread Spectrum Communication (1st Ed.). Prentice Hall PTR. ISBN0201633744.  "Telecom-Resource-CDMA“ . Telecom-Resources. Undated. http://www.freewebs.com/telecomm/cdma.html. Retrieved 2006-04-09.  Lohninger , Hans (2005-12-17). "Direct Sequence CDMA Simulation". Learning by Simulations. http://www.vias.org/simulations/simusoft_dscdma.html. Retrieved 2006-04-09.   Authentication and Security in Mobile Phones by Greg Rose, Qualcomm Inc., Australia
THANK YOU  !

Contenu connexe

Tendances

gsm and tdma technology
gsm and tdma technologygsm and tdma technology
gsm and tdma technologynarayana swamy
 
Examples of wireless communication systems
Examples of wireless communication systemsExamples of wireless communication systems
Examples of wireless communication systemsVvanithaECEngineerin
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple accessmangal das
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Hamidreza Bolhasani
 
Multiple input & Multiple Output Systems
Multiple input & Multiple Output SystemsMultiple input & Multiple Output Systems
Multiple input & Multiple Output SystemsShahneel Siddiqui
 
Csma protocols
Csma protocolsCsma protocols
Csma protocolsManal Shah
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumRohit Choudhury
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Zorays Solar Pakistan
 
LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term EvolutionArief Gunawan
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite CommunicationZunAib Ali
 
Introduction to-telecommunication-rf
Introduction to-telecommunication-rfIntroduction to-telecommunication-rf
Introduction to-telecommunication-rfTerra Sacrifice
 

Tendances (20)

gsm and tdma technology
gsm and tdma technologygsm and tdma technology
gsm and tdma technology
 
Examples of wireless communication systems
Examples of wireless communication systemsExamples of wireless communication systems
Examples of wireless communication systems
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple access
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
 
Multiple input & Multiple Output Systems
Multiple input & Multiple Output SystemsMultiple input & Multiple Output Systems
Multiple input & Multiple Output Systems
 
optics ppt
optics pptoptics ppt
optics ppt
 
GSM Link Budget
GSM Link BudgetGSM Link Budget
GSM Link Budget
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Call flow
Call flowCall flow
Call flow
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Multiple Access
Multiple AccessMultiple Access
Multiple Access
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread Spectrum
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...
 
LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term Evolution
 
TDMA, FDMA, CDMA
TDMA, FDMA, CDMATDMA, FDMA, CDMA
TDMA, FDMA, CDMA
 
DSL a Brief
DSL a BriefDSL a Brief
DSL a Brief
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite Communication
 
Ai Tdma
Ai TdmaAi Tdma
Ai Tdma
 
TDMA Time Division Multiple Access
TDMA Time Division Multiple AccessTDMA Time Division Multiple Access
TDMA Time Division Multiple Access
 
Introduction to-telecommunication-rf
Introduction to-telecommunication-rfIntroduction to-telecommunication-rf
Introduction to-telecommunication-rf
 

Similaire à Cdma Security

Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperST Engineering iDirect
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfakritigallery
 
Unit2 network communication for CIM
Unit2 network communication  for CIM Unit2 network communication  for CIM
Unit2 network communication for CIM Mathivanan Vk
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkIRJET Journal
 
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...IJMER
 
01 introduction new
01 introduction new01 introduction new
01 introduction newJamesChueh
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple accessMurtadha ali shukur
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfrohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfRobinKumar260480
 

Similaire à Cdma Security (20)

Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White Paper
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
 
Unit2 network communication for CIM
Unit2 network communication  for CIM Unit2 network communication  for CIM
Unit2 network communication for CIM
 
Ft2510561062
Ft2510561062Ft2510561062
Ft2510561062
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite Link
 
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
 
Acr5 dcb
Acr5 dcbAcr5 dcb
Acr5 dcb
 
01 introduction new
01 introduction new01 introduction new
01 introduction new
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
3g and 4g
3g and 4g3g and 4g
3g and 4g
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple access
 
C1 profinet design, pete brown
C1 profinet design, pete brownC1 profinet design, pete brown
C1 profinet design, pete brown
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfrohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
 
Mg3620962101
Mg3620962101Mg3620962101
Mg3620962101
 

Dernier

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Dernier (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Cdma Security

  • 1. CDMA SECURITY -AN INTELLIGENCE GUIDED BY- PROF. BHARATI S. AINAPURE PRESENTED BY-MUKESH KUMAR
  • 2. INTRODUCTION Wireless communication of information. Originated from military applications and cryptography. For military communications where information transmission heavily relies on wireless networks (for instance, from aircraft to aircraft, from aircraft to ground control center, etc.), security and reliability of the wireless communication systems is of number one priority, especially in national defense and emergency response to abrupt enemy attacks
  • 3. SECURITY OVERVIEW Protecting corporate network assets is an on-going task for IT professionals. Some of the top security issues:- 1).Unauthorizedsystems and network access. 2).Theft of intellectual property and confidential business information. 3).Internal and external sabotage .
  • 4. NETWORK AND TECHNOLOGY OVERVIEW It has Same components and technology used in corporate network. Difference between these two is found only in the access network.In access network high security and access protocols become paramount.
  • 5. CDMA2000 1xRTT AND 1xEV-DO More mobility , secure, high-speed access , and an extension of applications across the enterprise. Third-generation (3G) wireless networks, known as CDMA2000 The first phase of CDMA2000 is called 1xRTT. a).Maximum theoretical data rates of 144 Kbps (downlink) and 144 Kbps (uplink) ,Excellent voice capacity .
  • 6. CDMA2000 1xRTT AND 1xEV-DO Cdma2000 1xEV-DO Revision 0 (Rev. 0). a).Increases the downlink maximum theoretical data rate to 2.4 Mbps, with an average data rate between 400 and 700 Kbps. b).Supports Quality of Service (QoS) . c).boosts the maximum theoretical uplink speed to 1.8 Mbps (average 500–800 Kbps).
  • 7. ACCESS NETWORK Two types of access networks:- 1xRTT and 1xEV-DO . It is the mobile station’s entry point into the network . It maintains the communications link between the mobile station and the core network. It facilitates security by allowing only authorized mobile stations to access the network.
  • 8. ELEMENTS OF ACCESS NETWORK The AN is composed of the following elements: - a).Base Transceiver Station:-physically composed of antennas and towers. b).Packet Control Function:-maintains the “connection state” between the access network and mobile stations. c).Radio Network Controller/Base Station Controller:-packet transmission on the air interface and manage connection between BTS’s.
  • 10. CORE NETWORK Acts as the gateway between the access network and the Internet or enterprise private networks . It provides authentication, authorization, and accounting (AAA) services, provides access to network services, and manages IP addresses .
  • 11. ELEMENTS OF CORE NETWORK The core network comprises the following elements:- a).PDSN/Foreign Agent:-The PDSN is the gateway between the access network and the core network. b).AAA/Home Agent:-The AAA and the home agent (HA) are used for authentication, authorization, and accounting for data services .
  • 12. SECURITY-CDMA NETWORK The security protocols with CDMA-IS-41 networks are among the best in the industry. By design, CDMA technology makes interpretation of data very difficult. Unique to CDMA systems, is the 42-bit PN (Pseudo-Random Noise) Sequence called “Long Code” to scramble voice and data. On the forward link , data is scrambled at a rate of 19.2 Kilo symbols per second (Ksps) and on the reverse link, data is scrambled at a rate of 1.2288 Mega chips per second (Mcps).
  • 13. SECURITY-CDMA NETWORK CDMA network security protocols rely on a 64-bit authentication key (A-Key) and the Electronic Serial Number (ESN) of the mobile . The key factor for CDMA network is:- Authentication:-The mobile uses the SSD_A and the broadcast RAND* as inputs to generate an 18-bit authentication signature (AUTH_SIGNATURE), and sends it to the base station.
  • 14. SECURITY-CDMA NETWORK Voice, Signalling, and Data Privacy:-The mobile uses the SSD_B and to generate a Private Long Code Mask(derived from an intermediate value called Voice Privacy Mask. By design, all CDMA guided devices use a unique PN (Pseudo-random Noise) code for spreading the signal, which makes it difficult for the signal to be intercepted.
  • 15. Air Interface (Physical Layer) Mobile stations rely on radio technology to access the network. Security is of concern when using radio technology, but with the advances in radio technology. So several air interface security mechanisms have been developed to keep signals secure while increasing access capability.
  • 16. Air Interface Technologies Three types of technology :
  • 17. Air Interface Security Benefits CDMA security works on (direct sequence spread spectrum)DSSS technology. DSSS technology employs techniques that deliberately distribute or “spread” data over a frequency domain. The low probability of interception, demodulation difficulty, and anti-jamming/interference benefits of DSSS.CDMA technologies are why the military has used it for so many years. This is also why CDMA technology is inherently more secure than competing wireless technologies.
  • 18. EXAMPLE : .These are four mutually orthogonal digital signals. .These vectors will be assigned to individual users and are called the "code", "chipping code" or "chip code
  • 19. EXAMPLE : Each user is associated with a different code, sayv. ASSUMPTION: 1).If the data to be transmitted is a digital zero, then the actual bits transmitted will be –v. and, 2). if the data to be transmitted is a digital one, then the actual bits transmitted will be v. .so If v=(1,–1), and the data that the user wishes to transmit is (1, 0, 1, 1) this would correspond to (v, –v, v, v) which is then constructed in binary as ((1,–1),(–1,1),(1,–1),(1,–1).
  • 20. EXAMPLE If sender0 has code (1,–1) and data (1, 0, 1 ,1), and sender1 has code (1,1) and data (0,0,1,1), and both senders transmit simultaneously. Because signal0 and signal1 are transmitted at the same time into the air, they add to produce the raw signal:-(1,–1,–1,1,1,–1,1,–1) + (–1,–1,–1,–1,1,1,1,1) = (0,–2,–2,0,2,0,2,0).
  • 21. EXAMPLE: DECODER SIDE ENCODER SIDE
  • 22. Efficient Practical utilization of Fixed Frequency Spectrum. Flexible Allocation of Resources Privacy protection in CDMA due to anti-jamming capabilities of PN sequences We can change somewhat the flow rate of voice and signal by knowing the ESN AND MIN. ADVANTAGE AND WEAKNESS ADVANTAGE WEAKNESS
  • 23. FUTURE AND RESEARCH Continue work on verifying composition of security tunnels Currently thinking about attacks so now a days AES algorithm is used. Add the capability to reuse tunnels. seemed easy at first, but may require some major restructuring of the design.
  • 24. RESEARCH plan iRespond is a device that will provide an immediate response to a certain location.
  • 25. Conclusion It provides secure wireless communication. Its uplink and downlink communication , make it better than others. It is hard to detect , decode. Technology makes it better than other. It is better , but it is still secondary.
  • 26. REFERENCES Viterbi, Andrew J. (1995). CDMA: Principles of Spread Spectrum Communication (1st Ed.). Prentice Hall PTR. ISBN0201633744.  "Telecom-Resource-CDMA“ . Telecom-Resources. Undated. http://www.freewebs.com/telecomm/cdma.html. Retrieved 2006-04-09.  Lohninger , Hans (2005-12-17). "Direct Sequence CDMA Simulation". Learning by Simulations. http://www.vias.org/simulations/simusoft_dscdma.html. Retrieved 2006-04-09.  Authentication and Security in Mobile Phones by Greg Rose, Qualcomm Inc., Australia

Notes de l'éditeur

  1. the relationship between access network and core network.