SlideShare a Scribd company logo
1 of 1
Download to read offline
3. In GSM, (a) We assume that each subscriber has been assigned an IMSI (i. e. International
Mobile Subscriber Identity), and this information is public nown. If we want to provide a service
to hide this information even during the initial connection (i.e. including the registration),
suggest one solution to isfy this requirement. You need to point out how and why this solution
can protect IMSI. (no more than 30 words) (b) Multiple SRESs and RANDs are stored at VLR
for authentication purposes, where SRES=A3( Ki, RAND) and Ki is a pre-shared secret key
between the mobile subscriber and HLR. SRES needs to be protected and used as evidence to
collect a service fee. Since SRES is known by both mobile subscribers and VLR, repudiation
cannot be resolved. If we want to establish a partially non-repudiation service between the
mobile subscriber and VLR. suggest one solution to meet this requirement. (no more than 30
words) 4. In most wireless communications, there are 3 entities involved in connecting a call:
Mobile Subscriber (MS), VLR, and HLR. (a) Suggest a method that MS can protect its identity
when MS roams into a new VLR region. (i.e. MS does not need to expose its real identity to the
attacker when makes the first connection through VLR) (b) If only VLR and HLR have digital
certificates, can a secure channel be established between the MS and VLR? ( If your answer is
YES, you need to explain how.) 5. In SSL and TLS, why is there a separate Change Cipher Spec
Protocol rather than including a change_cipher_spec message in the Handshake Protocol? 6.
What steps are involved in the SSL Record Protocol transmission?

More Related Content

Similar to 3. In GSM, (a) We assume that each subscriber has been assigned an .pdf

Global system for mobile
Global system for mobileGlobal system for mobile
Global system for mobilePartha Bhunia
 
Unit 1 Intersystem CommunicationsCOP4858 PROGRAM & TECH ENH.docx
Unit 1 Intersystem CommunicationsCOP4858 PROGRAM & TECH ENH.docxUnit 1 Intersystem CommunicationsCOP4858 PROGRAM & TECH ENH.docx
Unit 1 Intersystem CommunicationsCOP4858 PROGRAM & TECH ENH.docxwillcoxjanay
 
WCDMA Principles
WCDMA PrinciplesWCDMA Principles
WCDMA PrinciplesAli Ibrahim
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryptionRK Nayak
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Hamidreza Bolhasani
 
Privacy in Location-Based Services using SP-Filtering in Hide and Seek Protoc...
Privacy in Location-Based Services using SP-Filtering in Hide and Seek Protoc...Privacy in Location-Based Services using SP-Filtering in Hide and Seek Protoc...
Privacy in Location-Based Services using SP-Filtering in Hide and Seek Protoc...Editor Jacotech
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansTelebeansolutions
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless CommunicationDon Norwood
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaOWASP Delhi
 
Hack.lu 2012 - Fuzzing the GSM protocol stack (paper)
Hack.lu 2012 - Fuzzing the GSM protocol stack (paper)Hack.lu 2012 - Fuzzing the GSM protocol stack (paper)
Hack.lu 2012 - Fuzzing the GSM protocol stack (paper)📡 Sebastien Dudek
 
6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptxhazhamina
 
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS cscpconf
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Similar to 3. In GSM, (a) We assume that each subscriber has been assigned an .pdf (20)

Global system for mobile
Global system for mobileGlobal system for mobile
Global system for mobile
 
Unit 1 Intersystem CommunicationsCOP4858 PROGRAM & TECH ENH.docx
Unit 1 Intersystem CommunicationsCOP4858 PROGRAM & TECH ENH.docxUnit 1 Intersystem CommunicationsCOP4858 PROGRAM & TECH ENH.docx
Unit 1 Intersystem CommunicationsCOP4858 PROGRAM & TECH ENH.docx
 
WCDMA Principles
WCDMA PrinciplesWCDMA Principles
WCDMA Principles
 
Jl3516261638
Jl3516261638Jl3516261638
Jl3516261638
 
Gsm fundamentals
Gsm fundamentalsGsm fundamentals
Gsm fundamentals
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
 
1377179967 42797809
1377179967  427978091377179967  42797809
1377179967 42797809
 
Privacy in Location-Based Services using SP-Filtering in Hide and Seek Protoc...
Privacy in Location-Based Services using SP-Filtering in Hide and Seek Protoc...Privacy in Location-Based Services using SP-Filtering in Hide and Seek Protoc...
Privacy in Location-Based Services using SP-Filtering in Hide and Seek Protoc...
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces Telebeans
 
Sms
Sms Sms
Sms
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless Communication
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj Verma
 
Hack.lu 2012 - Fuzzing the GSM protocol stack (paper)
Hack.lu 2012 - Fuzzing the GSM protocol stack (paper)Hack.lu 2012 - Fuzzing the GSM protocol stack (paper)
Hack.lu 2012 - Fuzzing the GSM protocol stack (paper)
 
five
fivefive
five
 
6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx
 
Gsm architecture
Gsm architecture Gsm architecture
Gsm architecture
 
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Gsm
GsmGsm
Gsm
 

More from ARUNHONEY1234

3. The population of the United States grew rapidly in the late 180.pdf
 3. The population of the United States grew rapidly in the late 180.pdf 3. The population of the United States grew rapidly in the late 180.pdf
3. The population of the United States grew rapidly in the late 180.pdfARUNHONEY1234
 
3.) Boudoin Corporation manufactures two products Product T72T and P.pdf
 3.) Boudoin Corporation manufactures two products Product T72T and P.pdf 3.) Boudoin Corporation manufactures two products Product T72T and P.pdf
3.) Boudoin Corporation manufactures two products Product T72T and P.pdfARUNHONEY1234
 
3. [2.5] Let X and Y be jointly distributed with joint probability ma.pdf
 3. [2.5] Let X and Y be jointly distributed with joint probability ma.pdf 3. [2.5] Let X and Y be jointly distributed with joint probability ma.pdf
3. [2.5] Let X and Y be jointly distributed with joint probability ma.pdfARUNHONEY1234
 
3. [ 10 points] Please subtract two FIXED POINT number in Hex, the fi.pdf
 3. [ 10 points] Please subtract two FIXED POINT number in Hex, the fi.pdf 3. [ 10 points] Please subtract two FIXED POINT number in Hex, the fi.pdf
3. [ 10 points] Please subtract two FIXED POINT number in Hex, the fi.pdfARUNHONEY1234
 
3. Write a node express EJS application that displays the Numerical o.pdf
 3. Write a node express EJS application that displays the Numerical o.pdf 3. Write a node express EJS application that displays the Numerical o.pdf
3. Write a node express EJS application that displays the Numerical o.pdfARUNHONEY1234
 
3. Write a function that takes one argument F for Fahrenheit and com.pdf
 3. Write a function that takes one argument F for Fahrenheit and com.pdf 3. Write a function that takes one argument F for Fahrenheit and com.pdf
3. Write a function that takes one argument F for Fahrenheit and com.pdfARUNHONEY1234
 
3. What does SSwithin� do when sample size increases a) It decreases.pdf
 3. What does SSwithin� do when sample size increases a) It decreases.pdf 3. What does SSwithin� do when sample size increases a) It decreases.pdf
3. What does SSwithin� do when sample size increases a) It decreases.pdfARUNHONEY1234
 
3. Which service is NOT provided by commercial banks a) deposits b) .pdf
 3. Which service is NOT provided by commercial banks a) deposits b) .pdf 3. Which service is NOT provided by commercial banks a) deposits b) .pdf
3. Which service is NOT provided by commercial banks a) deposits b) .pdfARUNHONEY1234
 
3. Voluntary contributions toward a public good Dina and Juanita are .pdf
 3. Voluntary contributions toward a public good Dina and Juanita are .pdf 3. Voluntary contributions toward a public good Dina and Juanita are .pdf
3. Voluntary contributions toward a public good Dina and Juanita are .pdfARUNHONEY1234
 
3. There were 150 people in attendance at a business conference on Tu.pdf
 3. There were 150 people in attendance at a business conference on Tu.pdf 3. There were 150 people in attendance at a business conference on Tu.pdf
3. There were 150 people in attendance at a business conference on Tu.pdfARUNHONEY1234
 
3. The equation for a supply curve is P=Q4+1. What is the elasticity.pdf
 3. The equation for a supply curve is P=Q4+1. What is the elasticity.pdf 3. The equation for a supply curve is P=Q4+1. What is the elasticity.pdf
3. The equation for a supply curve is P=Q4+1. What is the elasticity.pdfARUNHONEY1234
 
3. System Calls A system call is simply a kernel function that a wier.pdf
 3. System Calls A system call is simply a kernel function that a wier.pdf 3. System Calls A system call is simply a kernel function that a wier.pdf
3. System Calls A system call is simply a kernel function that a wier.pdfARUNHONEY1234
 
3. Shown below is a seismogram. Use an arrow to indicate the location.pdf
 3. Shown below is a seismogram. Use an arrow to indicate the location.pdf 3. Shown below is a seismogram. Use an arrow to indicate the location.pdf
3. Shown below is a seismogram. Use an arrow to indicate the location.pdfARUNHONEY1234
 
3. Refer to the 4. Refer to the information above to answer this qu.pdf
 3. Refer to the 4. Refer to the information above to answer this qu.pdf 3. Refer to the 4. Refer to the information above to answer this qu.pdf
3. Refer to the 4. Refer to the information above to answer this qu.pdfARUNHONEY1234
 
3. Prove or disprove the following claims below. Note, you can use th.pdf
 3. Prove or disprove the following claims below. Note, you can use th.pdf 3. Prove or disprove the following claims below. Note, you can use th.pdf
3. Prove or disprove the following claims below. Note, you can use th.pdfARUNHONEY1234
 
3. Producer surplus for a group of sellers The following graph plots .pdf
 3. Producer surplus for a group of sellers The following graph plots .pdf 3. Producer surplus for a group of sellers The following graph plots .pdf
3. Producer surplus for a group of sellers The following graph plots .pdfARUNHONEY1234
 
3. Let X1,X2,�,Xn be a random sample from a population with density f.pdf
 3. Let X1,X2,�,Xn be a random sample from a population with density f.pdf 3. Let X1,X2,�,Xn be a random sample from a population with density f.pdf
3. Let X1,X2,�,Xn be a random sample from a population with density f.pdfARUNHONEY1234
 
3. Name the 6 actions in the activation and contraction of skeletal m.pdf
 3. Name the 6 actions in the activation and contraction of skeletal m.pdf 3. Name the 6 actions in the activation and contraction of skeletal m.pdf
3. Name the 6 actions in the activation and contraction of skeletal m.pdfARUNHONEY1234
 
3. Please refer to the table below. Table 1 Contingency table detail.pdf
 3. Please refer to the table below. Table 1 Contingency table detail.pdf 3. Please refer to the table below. Table 1 Contingency table detail.pdf
3. Please refer to the table below. Table 1 Contingency table detail.pdfARUNHONEY1234
 
3. Let X and Y be discrete random variables with joint probability ma.pdf
 3. Let X and Y be discrete random variables with joint probability ma.pdf 3. Let X and Y be discrete random variables with joint probability ma.pdf
3. Let X and Y be discrete random variables with joint probability ma.pdfARUNHONEY1234
 

More from ARUNHONEY1234 (20)

3. The population of the United States grew rapidly in the late 180.pdf
 3. The population of the United States grew rapidly in the late 180.pdf 3. The population of the United States grew rapidly in the late 180.pdf
3. The population of the United States grew rapidly in the late 180.pdf
 
3.) Boudoin Corporation manufactures two products Product T72T and P.pdf
 3.) Boudoin Corporation manufactures two products Product T72T and P.pdf 3.) Boudoin Corporation manufactures two products Product T72T and P.pdf
3.) Boudoin Corporation manufactures two products Product T72T and P.pdf
 
3. [2.5] Let X and Y be jointly distributed with joint probability ma.pdf
 3. [2.5] Let X and Y be jointly distributed with joint probability ma.pdf 3. [2.5] Let X and Y be jointly distributed with joint probability ma.pdf
3. [2.5] Let X and Y be jointly distributed with joint probability ma.pdf
 
3. [ 10 points] Please subtract two FIXED POINT number in Hex, the fi.pdf
 3. [ 10 points] Please subtract two FIXED POINT number in Hex, the fi.pdf 3. [ 10 points] Please subtract two FIXED POINT number in Hex, the fi.pdf
3. [ 10 points] Please subtract two FIXED POINT number in Hex, the fi.pdf
 
3. Write a node express EJS application that displays the Numerical o.pdf
 3. Write a node express EJS application that displays the Numerical o.pdf 3. Write a node express EJS application that displays the Numerical o.pdf
3. Write a node express EJS application that displays the Numerical o.pdf
 
3. Write a function that takes one argument F for Fahrenheit and com.pdf
 3. Write a function that takes one argument F for Fahrenheit and com.pdf 3. Write a function that takes one argument F for Fahrenheit and com.pdf
3. Write a function that takes one argument F for Fahrenheit and com.pdf
 
3. What does SSwithin� do when sample size increases a) It decreases.pdf
 3. What does SSwithin� do when sample size increases a) It decreases.pdf 3. What does SSwithin� do when sample size increases a) It decreases.pdf
3. What does SSwithin� do when sample size increases a) It decreases.pdf
 
3. Which service is NOT provided by commercial banks a) deposits b) .pdf
 3. Which service is NOT provided by commercial banks a) deposits b) .pdf 3. Which service is NOT provided by commercial banks a) deposits b) .pdf
3. Which service is NOT provided by commercial banks a) deposits b) .pdf
 
3. Voluntary contributions toward a public good Dina and Juanita are .pdf
 3. Voluntary contributions toward a public good Dina and Juanita are .pdf 3. Voluntary contributions toward a public good Dina and Juanita are .pdf
3. Voluntary contributions toward a public good Dina and Juanita are .pdf
 
3. There were 150 people in attendance at a business conference on Tu.pdf
 3. There were 150 people in attendance at a business conference on Tu.pdf 3. There were 150 people in attendance at a business conference on Tu.pdf
3. There were 150 people in attendance at a business conference on Tu.pdf
 
3. The equation for a supply curve is P=Q4+1. What is the elasticity.pdf
 3. The equation for a supply curve is P=Q4+1. What is the elasticity.pdf 3. The equation for a supply curve is P=Q4+1. What is the elasticity.pdf
3. The equation for a supply curve is P=Q4+1. What is the elasticity.pdf
 
3. System Calls A system call is simply a kernel function that a wier.pdf
 3. System Calls A system call is simply a kernel function that a wier.pdf 3. System Calls A system call is simply a kernel function that a wier.pdf
3. System Calls A system call is simply a kernel function that a wier.pdf
 
3. Shown below is a seismogram. Use an arrow to indicate the location.pdf
 3. Shown below is a seismogram. Use an arrow to indicate the location.pdf 3. Shown below is a seismogram. Use an arrow to indicate the location.pdf
3. Shown below is a seismogram. Use an arrow to indicate the location.pdf
 
3. Refer to the 4. Refer to the information above to answer this qu.pdf
 3. Refer to the 4. Refer to the information above to answer this qu.pdf 3. Refer to the 4. Refer to the information above to answer this qu.pdf
3. Refer to the 4. Refer to the information above to answer this qu.pdf
 
3. Prove or disprove the following claims below. Note, you can use th.pdf
 3. Prove or disprove the following claims below. Note, you can use th.pdf 3. Prove or disprove the following claims below. Note, you can use th.pdf
3. Prove or disprove the following claims below. Note, you can use th.pdf
 
3. Producer surplus for a group of sellers The following graph plots .pdf
 3. Producer surplus for a group of sellers The following graph plots .pdf 3. Producer surplus for a group of sellers The following graph plots .pdf
3. Producer surplus for a group of sellers The following graph plots .pdf
 
3. Let X1,X2,�,Xn be a random sample from a population with density f.pdf
 3. Let X1,X2,�,Xn be a random sample from a population with density f.pdf 3. Let X1,X2,�,Xn be a random sample from a population with density f.pdf
3. Let X1,X2,�,Xn be a random sample from a population with density f.pdf
 
3. Name the 6 actions in the activation and contraction of skeletal m.pdf
 3. Name the 6 actions in the activation and contraction of skeletal m.pdf 3. Name the 6 actions in the activation and contraction of skeletal m.pdf
3. Name the 6 actions in the activation and contraction of skeletal m.pdf
 
3. Please refer to the table below. Table 1 Contingency table detail.pdf
 3. Please refer to the table below. Table 1 Contingency table detail.pdf 3. Please refer to the table below. Table 1 Contingency table detail.pdf
3. Please refer to the table below. Table 1 Contingency table detail.pdf
 
3. Let X and Y be discrete random variables with joint probability ma.pdf
 3. Let X and Y be discrete random variables with joint probability ma.pdf 3. Let X and Y be discrete random variables with joint probability ma.pdf
3. Let X and Y be discrete random variables with joint probability ma.pdf
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

3. In GSM, (a) We assume that each subscriber has been assigned an .pdf

  • 1. 3. In GSM, (a) We assume that each subscriber has been assigned an IMSI (i. e. International Mobile Subscriber Identity), and this information is public nown. If we want to provide a service to hide this information even during the initial connection (i.e. including the registration), suggest one solution to isfy this requirement. You need to point out how and why this solution can protect IMSI. (no more than 30 words) (b) Multiple SRESs and RANDs are stored at VLR for authentication purposes, where SRES=A3( Ki, RAND) and Ki is a pre-shared secret key between the mobile subscriber and HLR. SRES needs to be protected and used as evidence to collect a service fee. Since SRES is known by both mobile subscribers and VLR, repudiation cannot be resolved. If we want to establish a partially non-repudiation service between the mobile subscriber and VLR. suggest one solution to meet this requirement. (no more than 30 words) 4. In most wireless communications, there are 3 entities involved in connecting a call: Mobile Subscriber (MS), VLR, and HLR. (a) Suggest a method that MS can protect its identity when MS roams into a new VLR region. (i.e. MS does not need to expose its real identity to the attacker when makes the first connection through VLR) (b) If only VLR and HLR have digital certificates, can a secure channel be established between the MS and VLR? ( If your answer is YES, you need to explain how.) 5. In SSL and TLS, why is there a separate Change Cipher Spec Protocol rather than including a change_cipher_spec message in the Handshake Protocol? 6. What steps are involved in the SSL Record Protocol transmission?