SlideShare une entreprise Scribd logo
1  sur  27
CDMA SECURITY -AN INTELLIGENCE         GUIDED BY- PROF. BHARATI S. AINAPURE PRESENTED BY-MUKESH KUMAR
INTRODUCTION Wireless communication of  information. Originated from military applications  and cryptography. For military communications where information transmission heavily relies on wireless networks (for instance, from aircraft to aircraft, from aircraft to ground control center, etc.), security and reliability of the wireless communication systems is of number one priority, especially in national defense and emergency response to abrupt enemy attacks
SECURITY OVERVIEW Protecting corporate network assets is an on-going task for IT  professionals. Some of the top security issues:-      1).Unauthorizedsystems and network access.       2).Theft of intellectual property and confidential business information.        3).Internal and external sabotage .
NETWORK AND TECHNOLOGY OVERVIEW It has Same components and technology used in corporate network. Difference between these two is found only in the access network.In access network high security and access protocols become paramount.
CDMA2000 1xRTT AND 1xEV-DO More mobility , secure, high-speed access , and an extension of applications across the enterprise. Third-generation (3G) wireless networks, known as CDMA2000 The first phase of CDMA2000 is called 1xRTT.       a).Maximum theoretical data rates of 144 Kbps (downlink) and 144 Kbps (uplink) ,Excellent voice capacity .
CDMA2000 1xRTT AND 1xEV-DO Cdma2000  1xEV-DO Revision 0 (Rev. 0). a).Increases the downlink maximum theoretical data rate to 2.4 Mbps, with an average data rate between 400 and 700 Kbps. b).Supports Quality of Service (QoS) .        c).boosts the maximum theoretical uplink speed to 1.8 Mbps (average 500–800 Kbps).
ACCESS NETWORK Two types of access networks:- 1xRTT and 1xEV-DO . It is the mobile station’s entry point into the network . It maintains the communications link between the mobile station and the core network. It facilitates security by allowing only authorized mobile stations to access the network.
ELEMENTS OF ACCESS NETWORK The AN is composed of the following elements: - a).Base Transceiver Station:-physically composed of antennas and towers. b).Packet Control Function:-maintains the “connection state” between the access network and mobile stations. c).Radio Network Controller/Base Station Controller:-packet transmission on the air interface and manage connection between BTS’s.
ELEMENTS OF ACCESS NETWORK
CORE NETWORK Acts as the gateway between the access network and the Internet or enterprise private networks . It provides authentication, authorization, and accounting (AAA) services, provides access to network services, and manages IP addresses .
ELEMENTS OF CORE NETWORK The core network comprises the following elements:- a).PDSN/Foreign Agent:-The PDSN is the gateway between the access network and the core network. b).AAA/Home Agent:-The AAA and the home agent (HA) are used for authentication, authorization, and accounting for data services .
SECURITY-CDMA NETWORK The security protocols with CDMA-IS-41 networks are among the best in the industry.  By design, CDMA technology makes interpretation of data very difficult.  Unique to CDMA systems, is the 42-bit PN (Pseudo-Random Noise) Sequence called “Long Code” to scramble voice and data. On the forward link , data is scrambled at a rate of 19.2 Kilo symbols per second (Ksps) and on the reverse link, data is scrambled at a rate of 1.2288 Mega chips per second (Mcps).
SECURITY-CDMA NETWORK CDMA network security protocols rely on a 64-bit authentication key (A-Key) and the Electronic Serial Number (ESN) of the mobile . The key factor for CDMA network is:-      Authentication:-The mobile uses the SSD_A and the broadcast RAND* as inputs to generate an 18-bit authentication signature (AUTH_SIGNATURE), and sends it to the base station.
SECURITY-CDMA NETWORK Voice, Signalling, and Data Privacy:-The mobile uses the SSD_B and to generate a Private Long Code Mask(derived from an intermediate value called Voice Privacy Mask. By design, all CDMA guided devices use a unique PN (Pseudo-random Noise) code for spreading the signal, which makes it difficult for the signal to be intercepted.
Air Interface (Physical Layer) Mobile stations rely on radio technology to access the network.  Security is of concern when using radio technology, but with the advances in radio technology. So several air interface security mechanisms have been developed to keep signals secure while increasing access capability.
Air Interface Technologies Three types of technology :
Air Interface Security Benefits CDMA security works on (direct sequence spread spectrum)DSSS technology. DSSS technology employs techniques that deliberately distribute or “spread” data over a frequency domain. The low probability of interception, demodulation difficulty, and anti-jamming/interference benefits of DSSS.CDMA technologies are why the military has used it for so many years.                                    This is also why CDMA technology is inherently more secure than competing wireless technologies.
EXAMPLE : .These are four mutually orthogonal digital signals. .These vectors will be assigned to individual users and are called the "code", "chipping code" or "chip code
EXAMPLE : Each user is associated with a different code, sayv. ASSUMPTION: 1).If the data to be transmitted is a digital zero, then the actual bits transmitted will be –v. and,      2). if the data to be transmitted is a digital one, then the actual bits transmitted will be v.  .so If v=(1,–1), and the data that the user wishes to transmit is (1, 0, 1, 1) this would correspond to (v, –v, v, v) which is then constructed in binary as ((1,–1),(–1,1),(1,–1),(1,–1).
EXAMPLE If sender0 has code (1,–1) and data (1, 0, 1 ,1), and sender1 has code (1,1) and data (0,0,1,1), and both senders transmit simultaneously. Because signal0 and signal1 are transmitted at the same time into the air, they add to produce the raw signal:-(1,–1,–1,1,1,–1,1,–1) + (–1,–1,–1,–1,1,1,1,1) = (0,–2,–2,0,2,0,2,0).
EXAMPLE: DECODER SIDE ENCODER SIDE
Efficient Practical utilization of Fixed Frequency Spectrum. Flexible Allocation of Resources Privacy protection in CDMA due to anti-jamming capabilities of PN sequences We can change somewhat the flow rate of voice and signal by knowing the ESN AND MIN. ADVANTAGE AND WEAKNESS ADVANTAGE  WEAKNESS
FUTURE AND RESEARCH Continue work on verifying composition of security tunnels Currently thinking about attacks  so now a days AES algorithm is used. Add the capability to reuse tunnels. seemed easy at first, but may require some major restructuring                                 of the design.
RESEARCH plan iRespond is a device that will provide an immediate response to a certain location.
Conclusion It provides secure wireless  communication. Its uplink and downlink communication , make it better  than others. It is hard to detect , decode. Technology makes it better than other. It is better , but it is still secondary.
REFERENCES Viterbi, Andrew J. (1995). CDMA: Principles of Spread Spectrum Communication (1st Ed.). Prentice Hall PTR. ISBN0201633744.  "Telecom-Resource-CDMA“ . Telecom-Resources. Undated. http://www.freewebs.com/telecomm/cdma.html. Retrieved 2006-04-09.  Lohninger , Hans (2005-12-17). "Direct Sequence CDMA Simulation". Learning by Simulations. http://www.vias.org/simulations/simusoft_dscdma.html. Retrieved 2006-04-09.   Authentication and Security in Mobile Phones by Greg Rose, Qualcomm Inc., Australia
THANK YOU  !

Contenu connexe

Tendances

cell splitting and sectoring
cell splitting and sectoringcell splitting and sectoring
cell splitting and sectoringShwetanshu Gupta
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Small Scale Multi path measurements
Small Scale Multi path measurements Small Scale Multi path measurements
Small Scale Multi path measurements Siva Ganesan
 
Diversity techniques presentation material
Diversity techniques presentation materialDiversity techniques presentation material
Diversity techniques presentation materialNini Lashari
 
Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabSneheshDutta
 
Spread-Spectrum Techniques
Spread-Spectrum TechniquesSpread-Spectrum Techniques
Spread-Spectrum Techniquesmohammedalimahdi
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 
Wireless Channels Capacity
Wireless Channels CapacityWireless Channels Capacity
Wireless Channels CapacityOka Danil
 
Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)Omkar Rane
 
Introduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsIntroduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsNitin Jain
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrumHarshit Gupta
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing ProtocolsKABILESH RAMAR
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Digital t carriers and multiplexing power point (laurens)
Digital t carriers and multiplexing power point (laurens)Digital t carriers and multiplexing power point (laurens)
Digital t carriers and multiplexing power point (laurens)Laurens Luis Bugayong
 
Du binary signalling
Du binary signallingDu binary signalling
Du binary signallingsrkrishna341
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
 

Tendances (20)

Fading Seminar
Fading SeminarFading Seminar
Fading Seminar
 
cell splitting and sectoring
cell splitting and sectoringcell splitting and sectoring
cell splitting and sectoring
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Small Scale Multi path measurements
Small Scale Multi path measurements Small Scale Multi path measurements
Small Scale Multi path measurements
 
Diversity techniques presentation material
Diversity techniques presentation materialDiversity techniques presentation material
Diversity techniques presentation material
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Encoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlabEncoder for (7,3) cyclic code using matlab
Encoder for (7,3) cyclic code using matlab
 
Spread-Spectrum Techniques
Spread-Spectrum TechniquesSpread-Spectrum Techniques
Spread-Spectrum Techniques
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Wireless Channels Capacity
Wireless Channels CapacityWireless Channels Capacity
Wireless Channels Capacity
 
Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)Concept of Diversity & Fading (wireless communication)
Concept of Diversity & Fading (wireless communication)
 
Introduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsIntroduction To Wireless Fading Channels
Introduction To Wireless Fading Channels
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Digital t carriers and multiplexing power point (laurens)
Digital t carriers and multiplexing power point (laurens)Digital t carriers and multiplexing power point (laurens)
Digital t carriers and multiplexing power point (laurens)
 
Du binary signalling
Du binary signallingDu binary signalling
Du binary signalling
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 

Similaire à Cdma Security

Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperST Engineering iDirect
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfakritigallery
 
Unit2 network communication for CIM
Unit2 network communication  for CIM Unit2 network communication  for CIM
Unit2 network communication for CIM Mathivanan Vk
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
Wireless_communications_on_the_topic_by_WC
Wireless_communications_on_the_topic_by_WCWireless_communications_on_the_topic_by_WC
Wireless_communications_on_the_topic_by_WC1da20ec020ec
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkIRJET Journal
 
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...IJMER
 
01 introduction new
01 introduction new01 introduction new
01 introduction newJamesChueh
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple accessMurtadha ali shukur
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfrohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfRobinKumar260480
 

Similaire à Cdma Security (20)

Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White Paper
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
 
Unit2 network communication for CIM
Unit2 network communication  for CIM Unit2 network communication  for CIM
Unit2 network communication for CIM
 
Ft2510561062
Ft2510561062Ft2510561062
Ft2510561062
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Wireless_communications_on_the_topic_by_WC
Wireless_communications_on_the_topic_by_WCWireless_communications_on_the_topic_by_WC
Wireless_communications_on_the_topic_by_WC
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite Link
 
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
 
Acr5 dcb
Acr5 dcbAcr5 dcb
Acr5 dcb
 
01 introduction new
01 introduction new01 introduction new
01 introduction new
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
3g and 4g
3g and 4g3g and 4g
3g and 4g
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple access
 
C1 profinet design, pete brown
C1 profinet design, pete brownC1 profinet design, pete brown
C1 profinet design, pete brown
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfrohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
 

Dernier

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Cdma Security

  • 1. CDMA SECURITY -AN INTELLIGENCE GUIDED BY- PROF. BHARATI S. AINAPURE PRESENTED BY-MUKESH KUMAR
  • 2. INTRODUCTION Wireless communication of information. Originated from military applications and cryptography. For military communications where information transmission heavily relies on wireless networks (for instance, from aircraft to aircraft, from aircraft to ground control center, etc.), security and reliability of the wireless communication systems is of number one priority, especially in national defense and emergency response to abrupt enemy attacks
  • 3. SECURITY OVERVIEW Protecting corporate network assets is an on-going task for IT professionals. Some of the top security issues:- 1).Unauthorizedsystems and network access. 2).Theft of intellectual property and confidential business information. 3).Internal and external sabotage .
  • 4. NETWORK AND TECHNOLOGY OVERVIEW It has Same components and technology used in corporate network. Difference between these two is found only in the access network.In access network high security and access protocols become paramount.
  • 5. CDMA2000 1xRTT AND 1xEV-DO More mobility , secure, high-speed access , and an extension of applications across the enterprise. Third-generation (3G) wireless networks, known as CDMA2000 The first phase of CDMA2000 is called 1xRTT. a).Maximum theoretical data rates of 144 Kbps (downlink) and 144 Kbps (uplink) ,Excellent voice capacity .
  • 6. CDMA2000 1xRTT AND 1xEV-DO Cdma2000 1xEV-DO Revision 0 (Rev. 0). a).Increases the downlink maximum theoretical data rate to 2.4 Mbps, with an average data rate between 400 and 700 Kbps. b).Supports Quality of Service (QoS) . c).boosts the maximum theoretical uplink speed to 1.8 Mbps (average 500–800 Kbps).
  • 7. ACCESS NETWORK Two types of access networks:- 1xRTT and 1xEV-DO . It is the mobile station’s entry point into the network . It maintains the communications link between the mobile station and the core network. It facilitates security by allowing only authorized mobile stations to access the network.
  • 8. ELEMENTS OF ACCESS NETWORK The AN is composed of the following elements: - a).Base Transceiver Station:-physically composed of antennas and towers. b).Packet Control Function:-maintains the “connection state” between the access network and mobile stations. c).Radio Network Controller/Base Station Controller:-packet transmission on the air interface and manage connection between BTS’s.
  • 10. CORE NETWORK Acts as the gateway between the access network and the Internet or enterprise private networks . It provides authentication, authorization, and accounting (AAA) services, provides access to network services, and manages IP addresses .
  • 11. ELEMENTS OF CORE NETWORK The core network comprises the following elements:- a).PDSN/Foreign Agent:-The PDSN is the gateway between the access network and the core network. b).AAA/Home Agent:-The AAA and the home agent (HA) are used for authentication, authorization, and accounting for data services .
  • 12. SECURITY-CDMA NETWORK The security protocols with CDMA-IS-41 networks are among the best in the industry. By design, CDMA technology makes interpretation of data very difficult. Unique to CDMA systems, is the 42-bit PN (Pseudo-Random Noise) Sequence called “Long Code” to scramble voice and data. On the forward link , data is scrambled at a rate of 19.2 Kilo symbols per second (Ksps) and on the reverse link, data is scrambled at a rate of 1.2288 Mega chips per second (Mcps).
  • 13. SECURITY-CDMA NETWORK CDMA network security protocols rely on a 64-bit authentication key (A-Key) and the Electronic Serial Number (ESN) of the mobile . The key factor for CDMA network is:- Authentication:-The mobile uses the SSD_A and the broadcast RAND* as inputs to generate an 18-bit authentication signature (AUTH_SIGNATURE), and sends it to the base station.
  • 14. SECURITY-CDMA NETWORK Voice, Signalling, and Data Privacy:-The mobile uses the SSD_B and to generate a Private Long Code Mask(derived from an intermediate value called Voice Privacy Mask. By design, all CDMA guided devices use a unique PN (Pseudo-random Noise) code for spreading the signal, which makes it difficult for the signal to be intercepted.
  • 15. Air Interface (Physical Layer) Mobile stations rely on radio technology to access the network. Security is of concern when using radio technology, but with the advances in radio technology. So several air interface security mechanisms have been developed to keep signals secure while increasing access capability.
  • 16. Air Interface Technologies Three types of technology :
  • 17. Air Interface Security Benefits CDMA security works on (direct sequence spread spectrum)DSSS technology. DSSS technology employs techniques that deliberately distribute or “spread” data over a frequency domain. The low probability of interception, demodulation difficulty, and anti-jamming/interference benefits of DSSS.CDMA technologies are why the military has used it for so many years. This is also why CDMA technology is inherently more secure than competing wireless technologies.
  • 18. EXAMPLE : .These are four mutually orthogonal digital signals. .These vectors will be assigned to individual users and are called the "code", "chipping code" or "chip code
  • 19. EXAMPLE : Each user is associated with a different code, sayv. ASSUMPTION: 1).If the data to be transmitted is a digital zero, then the actual bits transmitted will be –v. and, 2). if the data to be transmitted is a digital one, then the actual bits transmitted will be v. .so If v=(1,–1), and the data that the user wishes to transmit is (1, 0, 1, 1) this would correspond to (v, –v, v, v) which is then constructed in binary as ((1,–1),(–1,1),(1,–1),(1,–1).
  • 20. EXAMPLE If sender0 has code (1,–1) and data (1, 0, 1 ,1), and sender1 has code (1,1) and data (0,0,1,1), and both senders transmit simultaneously. Because signal0 and signal1 are transmitted at the same time into the air, they add to produce the raw signal:-(1,–1,–1,1,1,–1,1,–1) + (–1,–1,–1,–1,1,1,1,1) = (0,–2,–2,0,2,0,2,0).
  • 21. EXAMPLE: DECODER SIDE ENCODER SIDE
  • 22. Efficient Practical utilization of Fixed Frequency Spectrum. Flexible Allocation of Resources Privacy protection in CDMA due to anti-jamming capabilities of PN sequences We can change somewhat the flow rate of voice and signal by knowing the ESN AND MIN. ADVANTAGE AND WEAKNESS ADVANTAGE WEAKNESS
  • 23. FUTURE AND RESEARCH Continue work on verifying composition of security tunnels Currently thinking about attacks so now a days AES algorithm is used. Add the capability to reuse tunnels. seemed easy at first, but may require some major restructuring of the design.
  • 24. RESEARCH plan iRespond is a device that will provide an immediate response to a certain location.
  • 25. Conclusion It provides secure wireless communication. Its uplink and downlink communication , make it better than others. It is hard to detect , decode. Technology makes it better than other. It is better , but it is still secondary.
  • 26. REFERENCES Viterbi, Andrew J. (1995). CDMA: Principles of Spread Spectrum Communication (1st Ed.). Prentice Hall PTR. ISBN0201633744.  "Telecom-Resource-CDMA“ . Telecom-Resources. Undated. http://www.freewebs.com/telecomm/cdma.html. Retrieved 2006-04-09.  Lohninger , Hans (2005-12-17). "Direct Sequence CDMA Simulation". Learning by Simulations. http://www.vias.org/simulations/simusoft_dscdma.html. Retrieved 2006-04-09.  Authentication and Security in Mobile Phones by Greg Rose, Qualcomm Inc., Australia

Notes de l'éditeur

  1. the relationship between access network and core network.