Blog
About

111
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Confidentiality in the UMTS Radio Access Network Simulation approach under OPNET

      ,

      Third International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2009) (VECOS)

      Verification and Evaluation of Computer and Communication Systems (VECoS 2009)

      2-3 July 2009

      UMTS, Confidentiality, Encryption, f8, RLC Acknowledged Mode, RLC Unacknowledged Mode, RLC Transparent Mode, OPNET simulation

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The Universal Mobile Telecommunications System (UMTS) offers a panoply of 3G services. In addition to delivery of images, graphics and video communications, UMTS is used for such applications as banking and e-commerce and hence security is a critical concern.

          In the present paper, we are interested in the confidentiality feature in the UMTS Network Access. Ciphering when applied is performed in the RNC and the UE either in the RLC sub-layer or in the MAC sub-layer. Our current research aims to examine exactly where the encryption/decryption occurs in the protocol stack of an UMTS network. And then introduce this security feature in the OPNET Modeler which is used to give a simulation approach of the use of the UTRAN confidentiality feature between RNC and UE.

          This paper is organized as follows. First, a brief description of the UMTS confidentiality mechanism. Then,We will be interested in the UMTS stack layers where the ciphering and deciphering of data would be performed. After, we will describe our simulation approach by exposing the changes made to mobile station and RNC node models in order to implement the confidentiality feature.

          Related collections

          Author and article information

          Contributors
          Conference
          July 2009
          July 2009
          : 1-11
          Affiliations
          Laboratoire Mathématiques, Informatiques et Applications

          Université Mohammed V Agdal, Faculté des Sciences

          BP 1014, Rabat, Maroc
          Article
          10.14236/ewic/VECOS2009.2
          © Said El Hajji et al. Published by BCS Learning and Development Ltd. Third International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2009), Rabat, Morroco

          This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

          Third International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2009)
          VECOS
          3
          Rabat, Morroco
          2-3 July 2009
          Electronic Workshops in Computing (eWiC)
          Verification and Evaluation of Computer and Communication Systems (VECoS 2009)
          Product
          Product Information: 1477-9358BCS Learning & Development
          Self URI (journal page): https://ewic.bcs.org/
          Categories
          Electronic Workshops in Computing

          Comments

          Comment on this article