EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

Wireless Internet Security

By:   •  Essay  •  634 Words  •  May 9, 2011  •  1,118 Views

Page 1 of 3

Wireless Internet Security

Héctor O. Sepúlveda

Y00270172

Case # 5

Wireless Internet Security

Cellular Communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send text messages etc. using our cell phones, and new services continue to be added. Therefore, it is important to provide users with a secure channel for communication. Limitations of cellular networks, their security issues and the different types of attacks are important in world telecommunications. Also, the security features of the Wireless Application Protocol (WAP).

Security Issues

There are several security issues that have to be taken into consideration when deploying a cellular infrastructure. The importance of which has increased with the advent of advanced networks like 3G.

1. Authentication: Cellular networks have a large number of subscribers, and each has to be authenticated to ensure the right people are using the network. Since the purpose of 3G is to enable people to communicate from anywhere in the world, the issue of cross region and cross provider authentication becomes an issue.

2. Integrity: With services such as SMS, chat and file transfer it is important that the data arrives without any modifications.

3. Confidentiality: With the increased use of cellular phones in sensitive communication, there is a need for a secure channel in order to transmit information.

4. Access Control: The Cellular device may have files that need to have restricted access to them. The device might access a database where some sort of role based access control is necessary.

5. Operating Systems In Mobile Devices: Cellular Phones have evolved from low processing power, ad-hoc supervisors to high power processors and full fledged operating systems. Some phones may use a Java Based system, others use Microsoft Windows CE and have the same capabilities as a desktop computer. Issues may arise in the OS which might open security holes that can be exploited.

6. Web Services: A Web Service is a component that provides functionality accessible through the web using the standard HTTP Protocol. This opens the cellular device to variety of security issues such as viruses, buffer overflows, denial of service attacks etc. Location Detection: The actual location of a cellular device needs to be kept hidden for reasons of privacy of the user. With

Continue for 2 more pages »  •  Join now to read essay Wireless Internet Security
Download as (for upgraded members)
txt
pdf