enhanced data security for wireless networks
TRANSCRIPT
![Page 1: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/1.jpg)
1
![Page 2: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/2.jpg)
2
Enhanced Data Security in Wireless Networks
ByAbhay Kumar Sah
(07J11A0403)Department of Electronics & Communication
Engineering (IV)
![Page 3: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/3.jpg)
3
Abstract
Wireless Wide Area Networks (WAN) are a popular method of wirelessly accessing data over the Internet. A major concern of many corporate users of Wireless WAN is data security and how to protect data that is transmitted over these wireless networks.
Discussion on
Cellular Digital Packet Data (CDPD)
Code Division Multiple Access (CDMA)
General Packet Radio Service (GPRS)
Virtual Private Networks (VPN)
![Page 4: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/4.jpg)
4
Cellular Digital Packet Data (CDPD)
Cellular Digital Packet Data (CDPD) is a technique used for transmitting small chunks of data, commonly referred to as packets, over the cellular network in a reliable manner.
CDPD Technology provide High Speed (19,2Kbps) High Capacity Cost Effective Data Services to mobile users Voice and Data can be transmitted
CDPD is a secure, proven and reliable protocol that has been used for law enforcement, public safety and mobile professionals to securely access critical, private information
![Page 5: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/5.jpg)
5
Operation of CDPD
CDPD Network Structure
![Page 6: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/6.jpg)
6
Features of CDPD
Subscriber Equipment Security
Authentication
Air Link Encryption
Network Security
Private Networks
![Page 7: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/7.jpg)
7
Applications
Transaction Application Communication between Two users Credit Card Verification Delivery and Tracking Electronic Mail Notification, etc…….
Broadcast Application File Transfer & Statistical Information Transfer General Information Service
(National/State/International News) Weather and Traffic Advisories Advertising and Private Bulletin Boards, etc……
![Page 8: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/8.jpg)
8
Code Division Multiple Access (CDMA)
This Technique was used to secure communications for the U.S. government (in Military) during the Cuban Missile Crisis.
Spread-spectrum technology works by taking the conversations or data and attaching a code (known only to the sender and receiver) to it.
The coded information is then split into packets and transmitted along with multiple other conversations or data packets over the network. The receiver then reassembles and decodes the data.
This result in extremely secure transmissions, because the coded information is spread over the same bandwidth, resulting in trillions of possible combinations of coded messages.
![Page 9: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/9.jpg)
9
Operation
![Page 10: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/10.jpg)
10
Operation
![Page 11: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/11.jpg)
11
Features of CDMA
Lock Codes
ESN and MIN Numbers
A – Keys
Authentication
Authentication Challenge
Voice Privacy
Signaling Message Encryption
![Page 12: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/12.jpg)
12
Smart Card Technology
A recent development is that CDMA technology now allows for the use of smart cards i.e. R-UIM (Removable User Identity Module) on CDMA-based networks.
Advantages of an R-UIM include: Easier replacement and exchange of handsets of mobile devices The Ability to move user profiles and personal data between devices Secure network connection Potential for cross-standard roaming capabilities
CDMA Applications It is used in may military applications such as Ranging, Secure
Communication, etc…….
![Page 13: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/13.jpg)
13
General Packet Radio Service (GPRS)
GPRS (General Packet Radio Service), the most widely used global wireless technology, offers high speed data services in GSM network.
It uses Packet Mode Technique to transfer data and provides connectivity to Internet.
Using GPRS you can download in your mobile the following: Polyphonic ring tones, MP3 tones, Color logos, Wallpapers, Videos, Animations, Games, E-mails and more.
Moreover, GPRS enables the users to send and receive MMS (Multimedia Messages).
![Page 14: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/14.jpg)
14
Operation of GPRS
GPRS Network Structure
![Page 15: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/15.jpg)
15
Features of GPRS
Subscriber Security
Authentication
Encryption
Network Security
Additional Encryption
Private APN
![Page 16: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/16.jpg)
16
Applications
Textural and Visual Information
Still and Moving Images
Web Browsing
Document Sharing
Audio
Job Dispatch
Corporate and Internet Email
File Transfer, etc…..
![Page 17: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/17.jpg)
17
Virtual Private Networks (VPN)
A Virtual Private Network (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network.
It aims to avoid an expensive system of owned or leased lines that can be used by only one organization.
For customers wanting additional security, an end-to-end VPN connection provides the best security.
![Page 18: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/18.jpg)
18
Virtual Private Networks (VPN)
Connection without VPN
![Page 19: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/19.jpg)
19
Virtual Private Networks (VPN)
Connection with VPN
![Page 20: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/20.jpg)
20
Virtual Private Networks (VPN)
VPN Vendors Checkpoint Cisco Nortel Intel Microsoft, etc….
A VPN is able to offer secure access to data and provides different levels of security that include tunneling, encryption, authentication, and authorization.
VPNs allow remote users seamless, low-cost access to corporate networks, all over a secure connection.
![Page 21: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/21.jpg)
21
Conclusion
WANs provide user Authentication and Data
Security and these are intended to provide data
protection within the carrier’s network but do not
extend to the Internet and beyond.
When a VPN is used with these networks, it provides
end-to-end security for all data sent over the Internet.
![Page 22: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/22.jpg)
22
References
1. www.sirreawireless.com 2. www.bitpipe.com 3. www.itpapers.com 4. www.google.com 5. “Mobile communication” by Schilfer 6. http://www.emory.edu/BUSINESS/et/cdpd/7. http://www.cdpd.org/8. http://www.datalife.gtem.com/9. http://www.pcsi.com/10. http://www.uplanet.com/11. http://www.bee.net/mhendry/vrml/library/cdma/cdma.htm12. Viterbi, A. CDMA: Principles of Spread Spectrum Communication Addison-Wesley
Wireless Communications Series, 199513. Pickholtz, R. L., Schilling, D. L., and Milstein, L. B. “Theory of Spread-Spectrum
Communications—A Tutorial” IEEE Trans. Commun., vol. COM30, no. 5, May 1982, pp 855-884.
14. Pickholtz, R. L., Schilling, D. L., and Milstein, L. B. Revisions to “Theory of Spread-Spectrum Communications—A Tutorial” IEEE Trans. Commun., vol. COM32, no. 2, Feb 1984, pp 211-212.
15. http://www.bsnl.co.in/service/mobile_gprswap.htm16. http://www.o2.co.uk/assets/O2HybridNav/Static-files/PDFs/GPRsHowAllWorks.pdf17. http://www.m-indya.com/gprs/applications.htm18. http://en.wikipedia.org/wiki/Virtual_private_network
![Page 23: Enhanced Data Security for Wireless Networks](https://reader034.vdocuments.net/reader034/viewer/2022051819/551e7898497959d9398b4a54/html5/thumbnails/23.jpg)
23
Thanks For Your Attention !!!!