Show simple item record

dc.contributor.advisorMichael A. Cusumano.en_US
dc.contributor.authorMochizuki, Yujiro, 1973-en_US
dc.contributor.otherMassachusetts Institute of Technology. Technology and Policy Program.en_US
dc.date.accessioned2006-11-07T12:46:10Z
dc.date.available2006-11-07T12:46:10Z
dc.date.copyright2006en_US
dc.date.issued2006en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/34531
dc.descriptionThesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2006.en_US
dc.descriptionIncludes bibliographical references (leaves 120-124).en_US
dc.description.abstractNetwork security ensures the consistency, integrity, and reliability of telecommunications systems. Authorized network access prevents fraudulent communications and maintains the availability of the systems. However, limited development time, cost reduction pressure and requirement for high reliability in software development have forced mobile carriers to implement the insufficient and inflexible authentication mechanisms. Technical specifications including network architecture, network protocols, and security algorithm are widely available to the public. In addition, both secured and unsecured networks are interconnected by global roaming services. The inadequate system design will make the mobile systems vulnerable to unauthorized access to mobile communications. Compared with GSM mobile systems, 3G mobile systems are equipped with more robust and flexible security mechanisms. The official position taken by mobile carriers, such as NTT DoCoMo, KDDI, and Vodafone, is that fraudulent communications, usually in the form of cloned mobile phones, are impossible with their 3G mobile systems. Examining the NTT DoCoMo's case, however, we find that this statement is based on weak security assumptions.en_US
dc.description.abstract(cont.) In order to avoid potential threats and to secure the 3G mobile systems, this thesis (1) explores the security architecture and mechanisms in 3G systems, (2) analyzes the current platform architecture and platform innovations of the network software, and (3) suggests a secure system design and development.en_US
dc.description.statementofresponsibilityby Yujiro Mochizuki.en_US
dc.format.extent124 leavesen_US
dc.format.extent6899228 bytes
dc.format.extent6905524 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/pdf
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsM.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582
dc.subjectTechnology and Policy Program.en_US
dc.titleSecuring against fraud in mobile communications : system design and development in 3G mobile networksen_US
dc.typeThesisen_US
dc.description.degreeS.M.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Engineering Systems Division
dc.contributor.departmentTechnology and Policy Program
dc.identifier.oclc70926422en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record