SlideShare uma empresa Scribd logo
1 de 27
CDMA SECURITY -AN INTELLIGENCE         GUIDED BY- PROF. BHARATI S. AINAPURE PRESENTED BY-MUKESH KUMAR
INTRODUCTION Wireless communication of  information. Originated from military applications  and cryptography. For military communications where information transmission heavily relies on wireless networks (for instance, from aircraft to aircraft, from aircraft to ground control center, etc.), security and reliability of the wireless communication systems is of number one priority, especially in national defense and emergency response to abrupt enemy attacks
SECURITY OVERVIEW Protecting corporate network assets is an on-going task for IT  professionals. Some of the top security issues:-      1).Unauthorizedsystems and network access.       2).Theft of intellectual property and confidential business information.        3).Internal and external sabotage .
NETWORK AND TECHNOLOGY OVERVIEW It has Same components and technology used in corporate network. Difference between these two is found only in the access network.In access network high security and access protocols become paramount.
CDMA2000 1xRTT AND 1xEV-DO More mobility , secure, high-speed access , and an extension of applications across the enterprise. Third-generation (3G) wireless networks, known as CDMA2000 The first phase of CDMA2000 is called 1xRTT.       a).Maximum theoretical data rates of 144 Kbps (downlink) and 144 Kbps (uplink) ,Excellent voice capacity .
CDMA2000 1xRTT AND 1xEV-DO Cdma2000  1xEV-DO Revision 0 (Rev. 0). a).Increases the downlink maximum theoretical data rate to 2.4 Mbps, with an average data rate between 400 and 700 Kbps. b).Supports Quality of Service (QoS) .        c).boosts the maximum theoretical uplink speed to 1.8 Mbps (average 500–800 Kbps).
ACCESS NETWORK Two types of access networks:- 1xRTT and 1xEV-DO . It is the mobile station’s entry point into the network . It maintains the communications link between the mobile station and the core network. It facilitates security by allowing only authorized mobile stations to access the network.
ELEMENTS OF ACCESS NETWORK The AN is composed of the following elements: - a).Base Transceiver Station:-physically composed of antennas and towers. b).Packet Control Function:-maintains the “connection state” between the access network and mobile stations. c).Radio Network Controller/Base Station Controller:-packet transmission on the air interface and manage connection between BTS’s.
ELEMENTS OF ACCESS NETWORK
CORE NETWORK Acts as the gateway between the access network and the Internet or enterprise private networks . It provides authentication, authorization, and accounting (AAA) services, provides access to network services, and manages IP addresses .
ELEMENTS OF CORE NETWORK The core network comprises the following elements:- a).PDSN/Foreign Agent:-The PDSN is the gateway between the access network and the core network. b).AAA/Home Agent:-The AAA and the home agent (HA) are used for authentication, authorization, and accounting for data services .
SECURITY-CDMA NETWORK The security protocols with CDMA-IS-41 networks are among the best in the industry.  By design, CDMA technology makes interpretation of data very difficult.  Unique to CDMA systems, is the 42-bit PN (Pseudo-Random Noise) Sequence called “Long Code” to scramble voice and data. On the forward link , data is scrambled at a rate of 19.2 Kilo symbols per second (Ksps) and on the reverse link, data is scrambled at a rate of 1.2288 Mega chips per second (Mcps).
SECURITY-CDMA NETWORK CDMA network security protocols rely on a 64-bit authentication key (A-Key) and the Electronic Serial Number (ESN) of the mobile . The key factor for CDMA network is:-      Authentication:-The mobile uses the SSD_A and the broadcast RAND* as inputs to generate an 18-bit authentication signature (AUTH_SIGNATURE), and sends it to the base station.
SECURITY-CDMA NETWORK Voice, Signalling, and Data Privacy:-The mobile uses the SSD_B and to generate a Private Long Code Mask(derived from an intermediate value called Voice Privacy Mask. By design, all CDMA guided devices use a unique PN (Pseudo-random Noise) code for spreading the signal, which makes it difficult for the signal to be intercepted.
Air Interface (Physical Layer) Mobile stations rely on radio technology to access the network.  Security is of concern when using radio technology, but with the advances in radio technology. So several air interface security mechanisms have been developed to keep signals secure while increasing access capability.
Air Interface Technologies Three types of technology :
Air Interface Security Benefits CDMA security works on (direct sequence spread spectrum)DSSS technology. DSSS technology employs techniques that deliberately distribute or “spread” data over a frequency domain. The low probability of interception, demodulation difficulty, and anti-jamming/interference benefits of DSSS.CDMA technologies are why the military has used it for so many years.                                    This is also why CDMA technology is inherently more secure than competing wireless technologies.
EXAMPLE : .These are four mutually orthogonal digital signals. .These vectors will be assigned to individual users and are called the "code", "chipping code" or "chip code
EXAMPLE : Each user is associated with a different code, sayv. ASSUMPTION: 1).If the data to be transmitted is a digital zero, then the actual bits transmitted will be –v. and,      2). if the data to be transmitted is a digital one, then the actual bits transmitted will be v.  .so If v=(1,–1), and the data that the user wishes to transmit is (1, 0, 1, 1) this would correspond to (v, –v, v, v) which is then constructed in binary as ((1,–1),(–1,1),(1,–1),(1,–1).
EXAMPLE If sender0 has code (1,–1) and data (1, 0, 1 ,1), and sender1 has code (1,1) and data (0,0,1,1), and both senders transmit simultaneously. Because signal0 and signal1 are transmitted at the same time into the air, they add to produce the raw signal:-(1,–1,–1,1,1,–1,1,–1) + (–1,–1,–1,–1,1,1,1,1) = (0,–2,–2,0,2,0,2,0).
EXAMPLE: DECODER SIDE ENCODER SIDE
Efficient Practical utilization of Fixed Frequency Spectrum. Flexible Allocation of Resources Privacy protection in CDMA due to anti-jamming capabilities of PN sequences We can change somewhat the flow rate of voice and signal by knowing the ESN AND MIN. ADVANTAGE AND WEAKNESS ADVANTAGE  WEAKNESS
FUTURE AND RESEARCH Continue work on verifying composition of security tunnels Currently thinking about attacks  so now a days AES algorithm is used. Add the capability to reuse tunnels. seemed easy at first, but may require some major restructuring                                 of the design.
RESEARCH plan iRespond is a device that will provide an immediate response to a certain location.
Conclusion It provides secure wireless  communication. Its uplink and downlink communication , make it better  than others. It is hard to detect , decode. Technology makes it better than other. It is better , but it is still secondary.
REFERENCES Viterbi, Andrew J. (1995). CDMA: Principles of Spread Spectrum Communication (1st Ed.). Prentice Hall PTR. ISBN0201633744.  "Telecom-Resource-CDMA“ . Telecom-Resources. Undated. http://www.freewebs.com/telecomm/cdma.html. Retrieved 2006-04-09.  Lohninger , Hans (2005-12-17). "Direct Sequence CDMA Simulation". Learning by Simulations. http://www.vias.org/simulations/simusoft_dscdma.html. Retrieved 2006-04-09.   Authentication and Security in Mobile Phones by Greg Rose, Qualcomm Inc., Australia
THANK YOU  !

Mais conteúdo relacionado

Mais procurados

gsm and tdma technology
gsm and tdma technologygsm and tdma technology
gsm and tdma technologynarayana swamy
 
Examples of wireless communication systems
Examples of wireless communication systemsExamples of wireless communication systems
Examples of wireless communication systemsVvanithaECEngineerin
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple accessmangal das
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Hamidreza Bolhasani
 
Multiple input & Multiple Output Systems
Multiple input & Multiple Output SystemsMultiple input & Multiple Output Systems
Multiple input & Multiple Output SystemsShahneel Siddiqui
 
Csma protocols
Csma protocolsCsma protocols
Csma protocolsManal Shah
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumRohit Choudhury
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Zorays Solar Pakistan
 
LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term EvolutionArief Gunawan
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite CommunicationZunAib Ali
 
Introduction to-telecommunication-rf
Introduction to-telecommunication-rfIntroduction to-telecommunication-rf
Introduction to-telecommunication-rfTerra Sacrifice
 

Mais procurados (20)

gsm and tdma technology
gsm and tdma technologygsm and tdma technology
gsm and tdma technology
 
Examples of wireless communication systems
Examples of wireless communication systemsExamples of wireless communication systems
Examples of wireless communication systems
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple access
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
 
Multiple input & Multiple Output Systems
Multiple input & Multiple Output SystemsMultiple input & Multiple Output Systems
Multiple input & Multiple Output Systems
 
optics ppt
optics pptoptics ppt
optics ppt
 
GSM Link Budget
GSM Link BudgetGSM Link Budget
GSM Link Budget
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Call flow
Call flowCall flow
Call flow
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Multiple Access
Multiple AccessMultiple Access
Multiple Access
 
FHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread SpectrumFHSS- Frequency Hop Spread Spectrum
FHSS- Frequency Hop Spread Spectrum
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...
 
LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term Evolution
 
TDMA, FDMA, CDMA
TDMA, FDMA, CDMATDMA, FDMA, CDMA
TDMA, FDMA, CDMA
 
DSL a Brief
DSL a BriefDSL a Brief
DSL a Brief
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite Communication
 
Ai Tdma
Ai TdmaAi Tdma
Ai Tdma
 
TDMA Time Division Multiple Access
TDMA Time Division Multiple AccessTDMA Time Division Multiple Access
TDMA Time Division Multiple Access
 
Introduction to-telecommunication-rf
Introduction to-telecommunication-rfIntroduction to-telecommunication-rf
Introduction to-telecommunication-rf
 

Semelhante a Cdma Security

Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperST Engineering iDirect
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfakritigallery
 
Unit2 network communication for CIM
Unit2 network communication  for CIM Unit2 network communication  for CIM
Unit2 network communication for CIM Mathivanan Vk
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkIRJET Journal
 
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...IJMER
 
01 introduction new
01 introduction new01 introduction new
01 introduction newJamesChueh
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentationbsnlpandian
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple accessMurtadha ali shukur
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfrohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfRobinKumar260480
 

Semelhante a Cdma Security (20)

Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White Paper
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
 
Unit2 network communication for CIM
Unit2 network communication  for CIM Unit2 network communication  for CIM
Unit2 network communication for CIM
 
Ft2510561062
Ft2510561062Ft2510561062
Ft2510561062
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
CDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite LinkCDMA Based Secure Cellular Communication via Satellite Link
CDMA Based Secure Cellular Communication via Satellite Link
 
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
 
Acr5 dcb
Acr5 dcbAcr5 dcb
Acr5 dcb
 
01 introduction new
01 introduction new01 introduction new
01 introduction new
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
3g and 4g
3g and 4g3g and 4g
3g and 4g
 
Optical code division multiple access
Optical code division multiple accessOptical code division multiple access
Optical code division multiple access
 
C1 profinet design, pete brown
C1 profinet design, pete brownC1 profinet design, pete brown
C1 profinet design, pete brown
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfrohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
 
Mg3620962101
Mg3620962101Mg3620962101
Mg3620962101
 

Último

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Cdma Security

  • 1. CDMA SECURITY -AN INTELLIGENCE GUIDED BY- PROF. BHARATI S. AINAPURE PRESENTED BY-MUKESH KUMAR
  • 2. INTRODUCTION Wireless communication of information. Originated from military applications and cryptography. For military communications where information transmission heavily relies on wireless networks (for instance, from aircraft to aircraft, from aircraft to ground control center, etc.), security and reliability of the wireless communication systems is of number one priority, especially in national defense and emergency response to abrupt enemy attacks
  • 3. SECURITY OVERVIEW Protecting corporate network assets is an on-going task for IT professionals. Some of the top security issues:- 1).Unauthorizedsystems and network access. 2).Theft of intellectual property and confidential business information. 3).Internal and external sabotage .
  • 4. NETWORK AND TECHNOLOGY OVERVIEW It has Same components and technology used in corporate network. Difference between these two is found only in the access network.In access network high security and access protocols become paramount.
  • 5. CDMA2000 1xRTT AND 1xEV-DO More mobility , secure, high-speed access , and an extension of applications across the enterprise. Third-generation (3G) wireless networks, known as CDMA2000 The first phase of CDMA2000 is called 1xRTT. a).Maximum theoretical data rates of 144 Kbps (downlink) and 144 Kbps (uplink) ,Excellent voice capacity .
  • 6. CDMA2000 1xRTT AND 1xEV-DO Cdma2000 1xEV-DO Revision 0 (Rev. 0). a).Increases the downlink maximum theoretical data rate to 2.4 Mbps, with an average data rate between 400 and 700 Kbps. b).Supports Quality of Service (QoS) . c).boosts the maximum theoretical uplink speed to 1.8 Mbps (average 500–800 Kbps).
  • 7. ACCESS NETWORK Two types of access networks:- 1xRTT and 1xEV-DO . It is the mobile station’s entry point into the network . It maintains the communications link between the mobile station and the core network. It facilitates security by allowing only authorized mobile stations to access the network.
  • 8. ELEMENTS OF ACCESS NETWORK The AN is composed of the following elements: - a).Base Transceiver Station:-physically composed of antennas and towers. b).Packet Control Function:-maintains the “connection state” between the access network and mobile stations. c).Radio Network Controller/Base Station Controller:-packet transmission on the air interface and manage connection between BTS’s.
  • 10. CORE NETWORK Acts as the gateway between the access network and the Internet or enterprise private networks . It provides authentication, authorization, and accounting (AAA) services, provides access to network services, and manages IP addresses .
  • 11. ELEMENTS OF CORE NETWORK The core network comprises the following elements:- a).PDSN/Foreign Agent:-The PDSN is the gateway between the access network and the core network. b).AAA/Home Agent:-The AAA and the home agent (HA) are used for authentication, authorization, and accounting for data services .
  • 12. SECURITY-CDMA NETWORK The security protocols with CDMA-IS-41 networks are among the best in the industry. By design, CDMA technology makes interpretation of data very difficult. Unique to CDMA systems, is the 42-bit PN (Pseudo-Random Noise) Sequence called “Long Code” to scramble voice and data. On the forward link , data is scrambled at a rate of 19.2 Kilo symbols per second (Ksps) and on the reverse link, data is scrambled at a rate of 1.2288 Mega chips per second (Mcps).
  • 13. SECURITY-CDMA NETWORK CDMA network security protocols rely on a 64-bit authentication key (A-Key) and the Electronic Serial Number (ESN) of the mobile . The key factor for CDMA network is:- Authentication:-The mobile uses the SSD_A and the broadcast RAND* as inputs to generate an 18-bit authentication signature (AUTH_SIGNATURE), and sends it to the base station.
  • 14. SECURITY-CDMA NETWORK Voice, Signalling, and Data Privacy:-The mobile uses the SSD_B and to generate a Private Long Code Mask(derived from an intermediate value called Voice Privacy Mask. By design, all CDMA guided devices use a unique PN (Pseudo-random Noise) code for spreading the signal, which makes it difficult for the signal to be intercepted.
  • 15. Air Interface (Physical Layer) Mobile stations rely on radio technology to access the network. Security is of concern when using radio technology, but with the advances in radio technology. So several air interface security mechanisms have been developed to keep signals secure while increasing access capability.
  • 16. Air Interface Technologies Three types of technology :
  • 17. Air Interface Security Benefits CDMA security works on (direct sequence spread spectrum)DSSS technology. DSSS technology employs techniques that deliberately distribute or “spread” data over a frequency domain. The low probability of interception, demodulation difficulty, and anti-jamming/interference benefits of DSSS.CDMA technologies are why the military has used it for so many years. This is also why CDMA technology is inherently more secure than competing wireless technologies.
  • 18. EXAMPLE : .These are four mutually orthogonal digital signals. .These vectors will be assigned to individual users and are called the "code", "chipping code" or "chip code
  • 19. EXAMPLE : Each user is associated with a different code, sayv. ASSUMPTION: 1).If the data to be transmitted is a digital zero, then the actual bits transmitted will be –v. and, 2). if the data to be transmitted is a digital one, then the actual bits transmitted will be v. .so If v=(1,–1), and the data that the user wishes to transmit is (1, 0, 1, 1) this would correspond to (v, –v, v, v) which is then constructed in binary as ((1,–1),(–1,1),(1,–1),(1,–1).
  • 20. EXAMPLE If sender0 has code (1,–1) and data (1, 0, 1 ,1), and sender1 has code (1,1) and data (0,0,1,1), and both senders transmit simultaneously. Because signal0 and signal1 are transmitted at the same time into the air, they add to produce the raw signal:-(1,–1,–1,1,1,–1,1,–1) + (–1,–1,–1,–1,1,1,1,1) = (0,–2,–2,0,2,0,2,0).
  • 21. EXAMPLE: DECODER SIDE ENCODER SIDE
  • 22. Efficient Practical utilization of Fixed Frequency Spectrum. Flexible Allocation of Resources Privacy protection in CDMA due to anti-jamming capabilities of PN sequences We can change somewhat the flow rate of voice and signal by knowing the ESN AND MIN. ADVANTAGE AND WEAKNESS ADVANTAGE WEAKNESS
  • 23. FUTURE AND RESEARCH Continue work on verifying composition of security tunnels Currently thinking about attacks so now a days AES algorithm is used. Add the capability to reuse tunnels. seemed easy at first, but may require some major restructuring of the design.
  • 24. RESEARCH plan iRespond is a device that will provide an immediate response to a certain location.
  • 25. Conclusion It provides secure wireless communication. Its uplink and downlink communication , make it better than others. It is hard to detect , decode. Technology makes it better than other. It is better , but it is still secondary.
  • 26. REFERENCES Viterbi, Andrew J. (1995). CDMA: Principles of Spread Spectrum Communication (1st Ed.). Prentice Hall PTR. ISBN0201633744.  "Telecom-Resource-CDMA“ . Telecom-Resources. Undated. http://www.freewebs.com/telecomm/cdma.html. Retrieved 2006-04-09.  Lohninger , Hans (2005-12-17). "Direct Sequence CDMA Simulation". Learning by Simulations. http://www.vias.org/simulations/simusoft_dscdma.html. Retrieved 2006-04-09.  Authentication and Security in Mobile Phones by Greg Rose, Qualcomm Inc., Australia

Notas do Editor

  1. the relationship between access network and core network.