Anda di halaman 1dari 67

Cell 1

Cell 2

Public
Switched
Telephone
Network
(PSTN)

Mobile
Telephone
Switching
Office
(MTSO)
HLR

Mobile User
Cordless connection
Wired connection

VLR

Base Transceiver Station (BTS)


HLR = Home Location Register
VLR = Visitor Location Register

Cell 1

Cell 2

Mobile
Telephone
Switching
Center
(MTSC)
HLR VLR

Public
Switched
Telephone
Network
(PSTN)

Handoffs (typically 30 mseconds):


1. At any time, mobile station (MS) is in one cell and under the control of a BS
2. When a MS leaves a cell, BS notices weak signal
3. BS asks surrounding BSs if they are getting a stronger signal
4. BS transfers ownership to one with strongest signal
5. MTSO assigns new channel to the MS and notifies MS of new boss

Cell-id based location.


assigned an id of the cell that you are in.
cell-id is stored in a database.
As you move from one cell to another, you are assigned a different
cell-id and the location database is updated.
most commonly used in cellular networks. (HLR, VLR)
Neighborhood polling: Connected mobile units only move to
adjacent cells
Time taken. In this case, the time taken between the device and the
antenna is used to calculate the location of the device.
Network assisted Global Positioning System (GPS). a GPS chip is
installed inside a phone and thus the location of the user is tracked.

Base station controller (BSC) and Base transceiver station


(BTS)
One BTS per cell.
One BSC can control multiple BTS.
Allocates radio channels among BTSs
Manages call handoffs between BTSs
Controls handset power levels

Mobile Switching Center (MSC) connects to PSTN and


switches calls between BScs. Provides mobile registration,
location, authentication. Contains Equipment Identity
Register.

Home Location Register (HLR) and Visitor Location Register


(VLR) provide call routing and roaming.

VLR+HLR+MSC functions are generally in one equipment.

Equipment Identity Register(EIR) contains a list of all valid mobiles.

Authentication center (AuC) stores the secret keys of all SIM cards.

Each handset has a International Mobile Equipment Identity(IMEI)


number.

Overview
Data Rates
2 Mbps
3G
(14.4Kbps to 2Mbps)

1 Mbps
100 Kbps

2.5G
(10-150Kbps)

10 Kbps

2G
(9.6Kbps)

1 Kbps

1G
(<1Kbps)

1980

1990

2000
Years

2010

1G: First generation wireless cellular: Early 1980s


Analog transmission, primarily speech: AMPS (Advanced Mobile
Phone Systems) and others
2G: Second generation wireless cellular: Late 1980s
Digital transmission
Primarily speech and low bit-rate data (9.6 Kbps)
High-tier: GSM, IS-95 (CDMA), etc
Low-tier (PCS): Low-cost, low-power, low-mobility e.g. PACS
2.5G: 2G evolved to medium rate (< 100kbps) data
3G: future Broadband multimedia
144 kbps - 384 kbps for high-mobility, high coverage
2 Mbps for low-mobility and low coverage
Beyond 3G: research in 4G

HSCSD (High Speed Circuit Switched Data) is a specification for


data transfer over GSM networks. HSCSD utilizes up to four
9.6Kb or 14.4Kb time slots, for a total bandwidth of 38.4Kb or
57.6Kb.
14.4Kb time slots are only available on GSM networks that
operate at 1,800Mhz. 900Mhz GSM networks are limited to
9.6Kb time slots. Therefore, HSCSD is limited to 38.4Kbps on
900Mhz GSM networks. HSCSD can only achieve 57.6Kbps on
1,800Mhz GSM networks.

Enhanced Data Rates for Global Evolution (EDGE) is a bolt-on


enhancement to 2G and GPRS networks. This technology is compatible with
TDMA and GSM networks. EDGE uses the same spectrum allocated for
GSM850, GSM900, GSM1800 and GSM1900 operation.

Instead of employing GMSK (Gaussian minimum-shift keying) EDGE uses


8PSK (8 Phase Shift Keying) producing a 3bit word for every change in
carrier phase. This effectively triples the gross data rate offered by GSM.
EDGE, like GPRS, uses a rate adaptation algorithm that adapts the modulation
and coding scheme (MCS) used to the quality of the radio channel, and thus
the bit rate and robustness of data transmission. It introduces a new technology
not found in GPRS, Incremental Redundancy, which, instead of retransmitting
disturbed packets, sends more redundancy information to be combined in the
receiver. This increases the probability of correct decoding.

GPRS is the packet-switched extension to GSM


sometimes referred to as 2.5G
packet-switched data services
suited to bursty traffic
charges usually based on data volume or content-based

Typical data services


browsing, messaging, download, corporate LAN access

3G Network Architecture
Wireless
Access Network
Mobile Access
Router

Core Network
Programmable
Softswitch

IP
Base Stations

Gateway
Application
Server

IP Intranet
Acces
s
Point

Telephone
Network

IP Intranet

(HLR)
User Profiles &
Authentication

802.11
3G Air
Interface

802.11
Acces
s
Point

Internet

Wired Access

Issues Vital to cellular


Frequency allocation

Licensed
Many providers
Multiple Access

Many users
Wide area of coverage
Traffic management
Location management

High mobility (in cars, trains)


Multiple suppliers
Handoff management, roaming
General principles
Handled differently by different generations

Session1
Time

Frequency

Frequency Division
Multiple Access (FDMA)
1G Cellular (AMPS)

All sessions
based on a
code

Time
Time Division
Multiple Access (TDMA)
2G TDMA
3G TDMA

Time
2G CDMA (IS-95)
3G CDMA

Session4
Session3

Session2

Session2

Frequency

Frequency

Session3

Session1

Session4

Code Division
Multiple Access (CDMA)

Digital traffic channels first-generation systems are almost


purely analog; second-generation systems are digital

Encryption all second generation systems provide


encryption to prevent eavesdropping

Error detection and correction second-generation digital


traffic allows for detection and correction, giving clear voice
reception

Channel access second-generation systems allow channels to


be dynamically shared by a number of users

Direct access to digital channel


Voice and data using one handset
PCS 1900 (GSM-1900)
9.6 kbps circuit switched data
14.4 kbps under definition
Packet mode specified
Short message service
IS-95-based CDMA
13 kbps circuit switched data
Packet mode specified
Short message service

Completely designed from scratch (no backward compatibility)


Uses 124 channels per cell, each channel can support 8 users
through TDM (992 users max)
Some channels used for control signals, etc.
Several flavors based on frequency:
GSM (900 MHz)
GSM 1800 (called DCS 1800)
GSM 1900 (called DCS 1900) - used in North America

GSM 1900 phone only works in North America.


In Europe, you can transfer your SIM (Subscriber Identity
Module) card to a phone of the correct frequency. This is called
SIM-roaming.

Subscriber Identity Module (SIM) contains a micro-controller


and storage. Contains authentication, encryption, and
accounting info.
Owners need 4-digit PIN.
SIM cards can contains additional info such as emergency
medical info.
Mobile Assisted Handoff :Mobile sends identities of six
candidate base stations for handoff. MSC selects.
Short Message Services(SMS)

Up to 160 characters
Sent over control channel
Unicast or broadcast

Authentication

network operator can verify the identity of the subscriber


making it infeasible to clone someone elses mobile phone

Confidentiality

protects voice, data and sensitive signalling information


(e.g. dialled digits) against eavesdropping on the radio path

Anonymity

protects against someone tracking the location of the user


or identifying calls made to or from the user by
eavesdropping on the radio path

Authentication centre in home network (AuC) and security


module (SIM) inserted into mobile phone share
subscriber specific secret key, Ki
authentication algorithm consisting of
authentication function, A3
key generating function, A8
AuC has a random number generator

Radio resources are allocated for only one or a few packets


at a time, so GPRS enables
many users to share radio resources, and allow efficient transport of
packets
connectivity to external packet data networks
volume-based charging

High data rates (up to 171 kbps in ideal case)


GPRS carries SMS in data channels rather than signaling
channels as in GSM

GPRS uses packet switched resource allocation

resources allocated only when data is to be sent/received

Flexible channel allocation

one to eight time slots


available resources shared by active users
up and down link channels reserved separately
GPRS and circuit switched GSM services can use same time slots
alternatively

Traffic characteristics suitable for GPRS

Intermittent, bursty data transmissions


Frequent transmissions of small volumes of data
Infrequent transmission of larger volumes of data

Standard data network protocol based


IP based applications
WWW, FTP, Telnet, ...
Any conventional TCP/IP based applications
X.25 based applications
Packet Assembly/Disassembly (PAD) type approach
GPRS specific protocol based
Point-to-point applications
Toll road system, UIC train control system
Point-to-multipoint applications
Weather info, road traffic info, news, fleet management
SMS delivery (GPRS as a bearer for SMS)

Enables communication between GPRS Support Nodes


Based on private IP network
IPv6 is the ultimate protocol
IPV4 can be used as an intermediate solution
Intra-PLMN backbone
Connects GPRS Support Nodes of one operator
Operator decides the network architecture
LAN, point-to-point links, ATM, ISDN, ...
Inter-PLMN backbone
Connects GPRS operators via BGs
Provides international GPRS roaming
Operators decide the backbone in the roaming agreement

Requires addition of a new class of nodes called GSNs


(GPRS Support Nodes)
SGSN: Serving GPRS Support Node,
GGSN: Gateway GPRS Support Node

BSC requires a PCU (Packet Control Unit) and various other


elements of the GSM n/w require software upgrades
All GSNs are connected via an IP-based backbone. Protocol
data units (PDUs) are encapsulated and tunneled between
GSNs

Radio resources are allocated for only one or a few packets at


a time, so GPRS enables
many users to share radio resources, and allow efficient transport of
packets
fast setup/access times
connectivity to external packet data n/w
volume-based charging

GPRS also carries SMS in data channels rather than


signaling channels as in GSM

Mobile station

Mobile station communicates across Um interface (air interface)


with base station transceiver in same cell as mobile unit
Mobile equipment (ME) physical terminal, such as a telephone
or PCS

ME includes radio transceiver, digital signal processors and subscriber identity


module (SIM)

GSM subscriber units are generic until SIM is inserted


SIMs roam, not necessarily the subscriber devices

BSS

BSS consists of base station controller and one or more base transceiver stations
(BTS)

BSC reserves radio frequencies, manages handoff of mobile unit


from one cell to another within BSS, and controls paging

Mobile Switching Center (MSC) is at core; consists of several


databases

Home location register (HLR) database stores


information about each subscriber that belongs to it
Visitor location register (VLR) database maintains
information about subscribers currently physically in the
region
Authentication center database (AuC) used for
authentication activities, holds encryption keys
Equipment identity register database (EIR) keeps track
of the type of equipment that exists at the mobile station

9
BTS
9

Terminating
MSC

10
10

10

4
VLR

2
Gateway
MTSC
5
HLR

10
3

Public
Switched
Telephone
Network
(PSTN)

10

5
1. Call made to mobile unit (cellular phone)
2. Telephone network recognizes number
and gives to gateway MSC
3. MSC cant route further, interrogates
users HLR
4. Interrogates VLR currently serving user
(roaming number request)
5. Routing number returned to HLR and
then to gateway MSC

6. Call routed to terminating MSC


7. MSC asks VLR to correlate call to
the subscriber
8. VLR complies
9. Mobile unit is paged
10. Mobile unit responds, MSCs convey
information back to telephone

Legend: MTSC= Mobile Telephone Service Center, BTS = Base Transceiver Station
HLR=Home Location Register, VLR=Visiting Location Register

IS-95 is the best known example of 2G with CDMA


Advantages of CDMA for Cellular

Frequency diversity frequency-dependent transmission


impairments have less effect on signal

Multipath resistance chipping codes used for CDMA exhibit low


cross correlation and low autocorrelation

Privacy privacy is inherent since spread spectrum is obtained by


use of noise-like signals

Graceful degradation system only gradually degrades as more


users access the system

Self-jamming arriving transmissions from multiple users


not aligned on chip boundaries unless users are perfectly
synchronized

Near-far problem signals closer to the receiver are


received with less attenuation than signals farther away

Soft handoff requires that the mobile acquires the new


cell before it relinquishes the old; this is more complex
than hard handoff used in FDMA and TDMA schemes

Wireless Network Evolution to 3rd


Generation

Enabling Technologies

3G
2 Mbps

CDMA2000
3XRTT
(UMTS)

CDMA Migration
1G-2G Migration
TDMA Migration

500 kbps

2.5G
150 Kbps

GPRS

2G

50 Kbps
10 Kbps

EDGE

CDMA-2000
1XRTT

100 Kbps

1G

W-CDMA
(UMTS)

IS-95
GSM

1 Kbps

AMPS
1980

1999

2000

2001

2002

2003

In this study security of internet access over the Third Generation (3G) telecommunication
systems is considered and Universal Mobile Telecommunications System (UMTS) is
selected as the most popular system among 3G systems.
The study then focuses on network access security mechanism of UMTS, called
Authentication and Key Agreement (AKA).
In addition, twenty types of important attacks and threats in UMTS system are presented
and classified based on three major security factors; authentication, confidentiality, and
data integrity.
The evaluations finally show that the authentication factor is more interesting than other
factors for hackers.
Then, we describe four attacks named; man-in the-middle, denial of service, identity
catching, and redirection as the most significant attacks against authentication mechanism.
Furthermore, we provide some solutions and methods to improve AKA mechanism and
prevent these attacks in UMTS system.

Build on the security of GSM


adopt the security features from GSM that have proved to be needed and
that are robust
try to ensure compatibility with GSM to ease inter-working and
handover

Correct the problems with GSM by addressing security


weaknesses
Add new security features
to secure new services offered by UMTS
to address changes in network architecture

UMTS System Architecture


Iu
Node B
RNC
USI
M
ME

Node B
C
u

Iu
b
Node B

Iu
r
RNC

Node B
UE

MSC/
VLR

UTRA
N

GMSC
External
Networks

U
u

HLR

SGSN

GGSN
CN

New Security Features for UMTS


Mutual authentication and key agreement
extension of user authentication mechanism
provides enhanced protection against false base station attacks by
allowing the mobile to authenticate the network

Integrity protection of critical signalling between mobile and


radio network controller
provides enhanced protection against false base station attacks by
allowing the mobile to check the authenticity of certain signalling
messages
extends the influence of user authentication when encryption is not
applied by allowing the network to check the authenticity of certain
signalling messages

UMTS Authentication
USIM

MSC or SGSN
Authentication Data
Request
RAND,SQNAK
|| AMF||MAC

{RAND, XRES, CK, IK,


SQNAK||AMF||MAC}

Decrypt SQN using f5


Verify MAC using f1
Check SQN freshness

RAND

f2-f4
RES, CK, IK

RES

RES = XRES?

HLR/AuC
AMF
SQN
RAND

f1-f5
XRES, CK,
IK, AK, MAC

UMTS Authentication Parameters


K
= Subscriber authentication key (128 bit)
RAND
= User authentication challenge (128 bit)
SQN
= Sequence number (48 bit)
AMF
= Authentication management field (16 bit)
MAC
= f1K (SQN||RAND||AMF) = Message Authentication
Code (64 bit)
(X)RES = f2K (RAND)
= (Expected) user response (32-128 bit)
CK
= f3K (RAND) = Cipher key (128 bit)
IK
= f4K (RAND) = Integrity key (128 bit)
AK
= f5K (RAND) = Anonymity key (48 bit)
AUTN
= SQNAK|| AMF||MAC = Authentication Token (128 bit)
Authentication quintet = {RAND, XRES, CK, IK, AUTN} (544-640 bit)
typically sent in batches to MSC or SGSN

UMTS Mutual Authentication


Algorithm
Located in the customers USIM and in the home networks
AuC
Standardisation not required and each operator can choose
their own
An example algorithm, called MILENAGE, has been made
available
open design and evaluation by ETSIs algorithm design group, SAGE
open publication of specifications and evaluation reports
based on Rijndael which was later selected as the AES

UMTS Encryption Principles


Data on the radio path is encrypted between the Mobile
Equipment (ME) and the Radio Network Controller (RNC)
protects user traffic and sensitive signalling data against
eavesdropping
extends the influence of authentication to the entire duration of the
call

Uses the 128-bit encryption key (CK) derived during


authentication

Ciphering And Integrity Algorithm


Requirements
Stream cipher f8 and integrity function f9
Suitable for implementation on ME and RNC
low power with low gate-count hardware implementation as well as
efficient in software

No export restrictions on terminals, and network equipment


exportable under licence in accordance with international
regulations

Table 8-3

cdmaOne (IS-95)

GSM, DCS-1900

IS-54/IS-136
PDC

Uplink Frequencies
(MHz)

824-849 (Cellular)
1850-1910 (US PCS)

890-915 MHz (Eurpe)


1850-1910 (US PCS)

800 MHz, 1500 Mhz


(Japan)
1850-1910 (US PCS)

Downlink Frequencies

869-894 MHz (US


Cellular)
1930-1990 MHz (US
PCS)

935-960 (Europa)
1930-1990 (US PCS)

869-894 MHz (Cellular)


1930-1990 (US PCS)
800 MHz, 1500 MHz
(Japan)

Deplexing

FDD

FDD

FDD

Multiple Access

CDMA

TDMA

TDMA

Modulation

BPSK with Quadrature


Spreading

GMSK with BT=0.3

DQPSK

Carrier Seperation

1.25 MHz

200 KHz

30 KHz (IS-136)
(25 KHz PDC)

Channel Data Rate

1.2288 Mchips/sec

270.833 Kbps

48.6 Kbps (IS-136)


42 Kbps (PDC)

Voice Channels per


carrier

64

Speech Coding

CELP at 13Kbps
EVRC at 8Kbps

RPE-LTP at 13 Kbps

VSELP at 7.95 Kbps

Major technical undertaking with many organizational and


marketing overtones.
Questions about the need for the additional investment for
3G (happy with 2.5G)
Wireless LAN in public places such as shopping malls and
airports offer options
Other high-speed wireless-data solutions compete with 3G
Mobitex low data rates (nominally 8 Kbps), it uses a narrowband
(2.5KHz) as compared to 30 KHz (GSM) and 5 MHz (3G).
Ricochet: 40 -128 kbps data rates. Bankruptcy
Flash-OFDM: 1.5 Mbps (upto 3 Mbps)

Standard

Type

Year
Intro

Multiple
Access

Frequency
Band
(MHz)

Modulation

Channe
l
BW
(KHz)

AMPS

Cellular

1983

FDMA

824-894

FM

30

USDC

Cellular

1991

TDMA

824-894

DQPSK

30

CDPD

Cellular

1993

FH/Packet

824-894

GMSK

30

IS-95

Cellular/PCS

1993

CDMA

824-894
1800-2000

QPSK/BPSK

1250

FLEX

Paging

1993

Simplex

Several

4-FSK

15

DCS-1900 PCS
(GSM)

1994

TDMA

1850-1990

GMSK

200

PACS

1994

TDMA/FDMA

1850-1990

DQPSK

300

Cordless/PC
S

Standard

Type

Year
Intro

Multiple
Access

Frequency
Band
(MHz)

Modulation

Channe
l
BW
(KHz)

ETACS

Cellular

1985

FDMA

900

FM

25

NMT-900

Cellular

1986

FDMA

890-960

FM

12.5

GSM

Cellular/PCS

1990

TDMA

890-960

GMSK

200KHz

C-450

Cellular

1985

FDMA

450-465

FM

20-10

ERMES

Paging

1993

FDMA4

Several

4-FSK

25

CT2

Cordless

1989

FDMA

864-868

GFSK

100

DECT

Cordless

1993

TDMA

1880-1900

GFSK

1728

1993

TDMA

1710-1880

GMSK

200

DCS-1800 Cordless/PC
S

Wireless networks with cellular data rates of 20 Mbits/second


and beyond.
AT&T has began a two-phase upgrade of its wireless network
on the way to 4G Access.
Nortel developing developing features for Internet protocolbased 4G networks
Alcatel, Ericsson, Nokia and Siemens found a new Wireless
World Research Forum (WWRF) for research on wireless
communications beyond 3G.
Many new technologies and techniques (multiplexing,
intelligent antennas, digital signal processing)
Industry response is mixed (some very critical)

Motivation
MANETS recent popularity
Self-configuration
Self-maintenance

Challenges to security

Open network architecture


Shared medium
Resource constraints
Dynamic topology

Goals of MANET Security


Protect network connectivity over multi-hop wireless
channels
Link level solutions + network level solutions

Approaches
Proactive
Reactive

Considerations
Overhead versus performance

Attacks (Network Layer)


Routing attacks
Attempt to screw up the others routing tables (remote effect)

Forwarding attacks
Leave routing tables alone, but change delivery of packets (local
effect)

Attack dependent on underlying protocol


Effects

Attacks (Link Layer)


Forwarding attacks
DoS attacks
Manipulation of backoff interval
Easy corruption of others data

Effects are compounded at higher layers

MANETS SECURITY SERVICES


A MANET is a network consisting of a collection of nodes capable of
communicating with each other without help from infrastructure of the network.
There are mainly five security services:
Authentication
Correct identity is known to the communicating partner.
Confidentiality
Message information is kept secure from unauthorized party.
Integrity
Message is unaltered during communication.

Non Repudiation
The origin of the message cannot deny having sent the message.
Availability
The normal service provision in face of all kind of attacks.

Security means the security mechanism for all protocols involved in this
(MANET) service to protect the basic function of MANET means security
during bit transfer from one node to another.

CATEGORIZING NETWORK ATTACKS


Attacks on the ad hoc networks can be broadly categorized as Passive Attacks and
Active Attacks
Passive Attacks - The main aim of passive attackers is to steal the valuable
information from the targeted networks. Attackers do not disturb the normal
network functioning like inducing false packets or dropping packets. They simply
become a part of the network but

continuously keeps an eye on the network traffic thus in turn violating the
message confidentiality constraint. Since they do not initiate any malicious
activity to disrupt the normal functioning of the network, it becomes very difficult
to identify such attacks. Examples of such types of attacks are traffic analysis,
traffic monitoring and eavesdropping.

CATEGORIZING NETWORK ATTACKS


Active Attacks - Active attackers tamper with the network traffic like cause
congestion, propagation of incorrect routing information etc. Due to their active
participation, their detection and prevention can be done using suitable
prevention algorithms. Examples of passive attacks include modification attack,
impersonation, fabrication and message replay. Attacks can also be classified
depending upon the position of the attacker in the network.
External attacks External Attacks are the attacks made by the unauthorized
nodes which are not a part of the network. External attackers can flood bogus
packets in the network, impersonation etc. Their aim can be to cause congestion
or to disrupt normal network functioning.
.

CATEGORIZING NETWORK ATTACKS


Internal attacks Internal Attacks are caused by the authorized nodes in the
network. The reason for their malicious behavior may be the following:
a) Hijacking those (authorized) nodes by some external attacker and then using
them for launching internal attacks in the network.
b) Selfishness to save their limited resources like battery power, processing
capabilities, and the communication bandwidth and exploiting other nodes for
their benefit.

Solution Outline A Multi-fence Security


Solution

Challenges
Distribution
Involve multiple layers
Attack awareness
Completeness

Solution Outline A Multi-fence Security


Solution
Key Definitions and Distribution Methodology
System Public key
System Private Key
Cluster key
Head of cluster key(Public and private key)

Authentication Scenarios
1. Node joins a network
2. Node leaves a cluster
3. Inter cluster comm. by nodes

Group Member Authentication Protocol in


Mobile Ad-hoc Networks
In a mobile ad-hoc network (MANET) architecture, there is no preexisting fixed network infrastructure, and a mobile node in this
network sends data packets to a destination node directly or through
its neighbor nodes.
This situation is of potential security concern since the neighbor
nodes cannot be always trusted
It aims to allow a set of nodes to legitimately participate in group
communication and then distribute a secret group key to the
approved nodes to establish secure communication with group
members.

Group Member Authentication Protocol in


Mobile Ad-hoc Networks
This protocol provides knowledge-based group member
authentication, which recognizes a list of secret group keys
held in a mobile node as the node's group membership.
It employs zero knowledge proof and threshold cryptography.
We then introduce our actual implementation and evaluate the
behavior to ensure its successful deployment

Transactions Based Authentication Scheme:


A Cognitive Agents Based Approach
The vulnerable air interface, device level constraints, and
insecure encryption techniques of wireless networks have
naturally increased the chance of attacker obtaining users
information fraudulently.
Most of the existing authentication systems for mobile
communication principally depends on the strength of
authenticating identifiers.
Once the client who may be genuine or an attacker, successfully
proves the possession of the identifiers the system accepts all the
transactions of a session under single risk level, which is the most
important point of vulnerability.
We propose a novel transaction based authentication
scheme(TBAS) for mobile communication using cognitive
agents.

Transactions Based Authentication Scheme:


A Cognitive Agents Based Approach
The proposed approach intensifies the procedure of authentication
by deploying authentication scheme based on the transaction
sensitivity and client's transaction time behaviors.
The TBAS provides effective authentication solution, by relieving
the conventional authentication systems, from being dependent on
only the strength of authentication identifiers. Additionally the
transaction time behavior analysis by cognitive agents provides
rational approach towards establishing the legitimacy or illegitimacy
of the mobile client. The method has been simulated with different
applications over in-house established wired and wireless networks.
The agent factory framework is used for cognitive agents generation
and communication. The simulation results are quite encouraging.

Thank You

Anda mungkin juga menyukai