Cdma Security

4,673 views
4,420 views

Published on

CDMA Security is most valuable and most secure technology.It provide secure data communication and data transfer.

Published in: Technology
1 Comment
3 Likes
Statistics
Notes
  • very useful
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
4,673
On SlideShare
0
From Embeds
0
Number of Embeds
38
Actions
Shares
0
Downloads
138
Comments
1
Likes
3
Embeds 0
No embeds

No notes for slide
  • the relationship between access network and core network.
  • Cdma Security

    1. 1. CDMA SECURITY<br />-AN INTELLIGENCE<br /> GUIDED BY- PROF. BHARATI S. AINAPURE<br />PRESENTED BY-MUKESH KUMAR<br />
    2. 2. INTRODUCTION<br />Wireless communication of information.<br />Originated from military applications and cryptography.<br />For military communications where information transmission heavily relies on wireless networks (for instance, from aircraft to aircraft, from aircraft to ground control center, etc.), security and reliability of the wireless communication systems is of number one priority, especially in national defense and emergency response to abrupt enemy attacks<br />
    3. 3. SECURITY OVERVIEW<br />Protecting corporate network assets is an on-going task for IT professionals.<br />Some of the top security issues:-<br /> 1).Unauthorizedsystems and network access.<br /> 2).Theft of intellectual property and confidential business information.<br /> 3).Internal and external sabotage .<br />
    4. 4. NETWORK AND TECHNOLOGY OVERVIEW<br />It has Same components and technology used in corporate network.<br />Difference between these two is found only in the access network.In access network high security and access protocols become paramount. <br />
    5. 5. CDMA2000 1xRTT AND 1xEV-DO<br />More mobility , secure, high-speed access , and an extension of applications across the enterprise.<br />Third-generation (3G) wireless networks, known as CDMA2000<br />The first phase of CDMA2000 is called 1xRTT.<br /> a).Maximum theoretical data rates of 144 Kbps (downlink) and 144 Kbps (uplink) ,Excellent voice capacity .<br />
    6. 6. CDMA2000 1xRTT AND 1xEV-DO<br />Cdma2000 1xEV-DO Revision 0 (Rev. 0).<br />a).Increases the downlink maximum theoretical data rate to 2.4 Mbps, with an average data rate between 400 and 700 Kbps.<br />b).Supports Quality of Service (QoS) .<br /> c).boosts the maximum theoretical uplink speed to 1.8 Mbps (average 500–800 Kbps).<br />
    7. 7. ACCESS NETWORK<br />Two types of access networks:- 1xRTT and 1xEV-DO .<br />It is the mobile station’s entry point into the network .<br />It maintains the communications link between the mobile station and the core network.<br />It facilitates security by allowing only authorized mobile stations to access the network.<br />
    8. 8. ELEMENTS OF ACCESS NETWORK<br />The AN is composed of the following elements: -<br />a).Base Transceiver Station:-physically composed of antennas and towers.<br />b).Packet Control Function:-maintains the “connection state” between the access network and mobile stations.<br />c).Radio Network Controller/Base Station Controller:-packet transmission on the air interface and manage connection between BTS’s.<br />
    9. 9. ELEMENTS OF ACCESS NETWORK<br />
    10. 10. CORE NETWORK<br />Acts as the gateway between the access network and the Internet or enterprise private networks .<br />It provides authentication, authorization, and accounting (AAA) services, provides access to network services, and manages IP addresses .<br />
    11. 11. ELEMENTS OF CORE NETWORK<br />The core network comprises the following elements:-<br />a).PDSN/Foreign Agent:-The PDSN is the gateway between the access network and the core network.<br />b).AAA/Home Agent:-The AAA and the home agent (HA) are used for authentication, authorization, and accounting for data services .<br />
    12. 12. SECURITY-CDMA NETWORK<br />The security protocols with CDMA-IS-41 networks are among the best in the industry. <br />By design, CDMA technology makes interpretation of data very difficult.<br /> Unique to CDMA systems, is the 42-bit PN (Pseudo-Random Noise) Sequence called “Long Code” to scramble voice and data.<br />On the forward link , data is scrambled at a rate of 19.2 Kilo symbols per second (Ksps) and on the reverse link, data is scrambled at a rate of 1.2288 Mega chips per second (Mcps).<br />
    13. 13. SECURITY-CDMA NETWORK<br />CDMA network security protocols rely on a 64-bit authentication key (A-Key) and the Electronic Serial Number (ESN) of the mobile . The key factor for CDMA network is:-<br /> Authentication:-The mobile uses the SSD_A and the broadcast RAND* as inputs to generate an 18-bit authentication signature (AUTH_SIGNATURE), and sends it to the base station.<br />
    14. 14. SECURITY-CDMA NETWORK<br />Voice, Signalling, and Data Privacy:-The mobile uses the SSD_B and to generate a Private Long Code Mask(derived from an intermediate value called Voice Privacy Mask.<br />By design, all CDMA guided devices use a unique PN (Pseudo-random Noise) code for spreading the signal, which makes it difficult for the signal to be intercepted.<br />
    15. 15. Air Interface (Physical Layer)<br />Mobile stations rely on radio technology to access the network. <br />Security is of concern when using radio technology, but with the advances in radio technology.<br />So several air interface security mechanisms have been developed to keep signals secure while increasing access capability. <br />
    16. 16. Air Interface Technologies<br />Three types of technology :<br />
    17. 17. Air Interface Security Benefits<br />CDMA security works on (direct sequence spread spectrum)DSSS technology.<br />DSSS technology employs techniques that deliberately distribute or “spread” data over a frequency domain.<br />The low probability of interception, demodulation difficulty, and anti-jamming/interference benefits of DSSS.CDMA technologies are why the military has used it for so many years. <br /> This is also why CDMA technology is inherently more secure than competing wireless technologies.<br />
    18. 18. EXAMPLE :<br />.These are four mutually orthogonal digital signals.<br />.These vectors will be assigned to individual users and are called the "code", "chipping code" or "chip code<br />
    19. 19. EXAMPLE :<br />Each user is associated with a different code, sayv.<br />ASSUMPTION: 1).If the data to be transmitted is a digital zero, then the actual bits transmitted will be –v. and,<br /> 2). if the data to be transmitted is a digital one, then the actual bits transmitted will be v.<br /> .so If v=(1,–1), and the data that the user wishes to transmit is (1, 0, 1, 1) this would correspond to (v, –v, v, v) which is then constructed in binary as ((1,–1),(–1,1),(1,–1),(1,–1).<br />
    20. 20. EXAMPLE<br />If sender0 has code (1,–1) and data (1, 0, 1 ,1), and sender1 has code (1,1) and data (0,0,1,1), and both senders transmit simultaneously.<br />Because signal0 and signal1 are transmitted at the same time into the air, they add to produce the raw signal:-(1,–1,–1,1,1,–1,1,–1) + (–1,–1,–1,–1,1,1,1,1) = (0,–2,–2,0,2,0,2,0).<br />
    21. 21. EXAMPLE:<br />DECODER SIDE<br />ENCODER SIDE<br />
    22. 22. Efficient Practical utilization of Fixed Frequency Spectrum.<br />Flexible Allocation of Resources<br />Privacy protection in CDMA due to anti-jamming capabilities of PN sequences<br />We can change somewhat the flow rate of voice and signal by knowing the ESN AND MIN.<br />ADVANTAGE AND WEAKNESS<br />ADVANTAGE <br />WEAKNESS<br />
    23. 23. FUTURE AND RESEARCH<br />Continue work on verifying composition of security tunnels<br />Currently thinking about attacks so now a days AES algorithm is used.<br />Add the capability to reuse tunnels.<br />seemed easy at first, but may require some major restructuring <br /> of the design.<br />
    24. 24. RESEARCH plan<br />iRespond is a device that will provide an immediate response to a certain location.<br />
    25. 25. Conclusion<br />It provides secure wireless communication.<br />Its uplink and downlink communication , make it better than others.<br />It is hard to detect , decode.<br />Technology makes it better than other.<br />It is better , but it is still secondary.<br />
    26. 26. REFERENCES<br />Viterbi, Andrew J. (1995). CDMA: Principles of Spread Spectrum Communication (1st Ed.). Prentice Hall PTR. ISBN0201633744. <br />"Telecom-Resource-CDMA“ . Telecom-Resources. Undated. http://www.freewebs.com/telecomm/cdma.html. Retrieved 2006-04-09. <br />Lohninger , Hans (2005-12-17). "Direct Sequence CDMA Simulation". Learning by Simulations. http://www.vias.org/simulations/simusoft_dscdma.html. Retrieved 2006-04-09. <br /> Authentication and Security in Mobile Phones by Greg Rose, Qualcomm Inc., Australia<br />
    27. 27. THANK YOU !<br />

    ×