Figure 2 - uploaded by Daehyun Ryu
Content may be subject to copyright.
Data Flow between the MS and the BS 

Data Flow between the MS and the BS 

Source publication
Article
Full-text available
Summary We consider the problem of security in the CDMA. CDMA system has wireless channels to transmit voice or data. By this reason, CDMA communication has a possibility of being eavesdropped by someone. It is known that eavesdropping in CDMA system is impossible because the voice data spreads with the PN. However, we can eavesdrop the CDMA data u...

Context in source publication

Context 1
... 1. Forward Traffic Channel Structure Each mobile unit is identified as the following sets of numbers. The first number is the Mobile Identification Number (MIN). This 34 bits binary number is derived from the unit’s telephone number, MIN1 is the last seven digits of the telephone number and MIN2 is the area code. The MIN is your telephone number. MINs are keypad programmable. You or a dealer can assign any number what you want. A MIN is ten digits long. A MIN is not your directory number since it is not long enough to include a country code. Figure 2 shows the data flow between the MS and the BS .  ...

Similar publications

Article
Receivers currently employ single- or dual-polarized antennas, which measure one or two components of the received electromagnetic (EM) signal. In rich scattering environments, however, it may be possible to improve performance by using “vector antennas” as they can detect up to six independent components of the EM field. In this paper, theoretical...
Article
Full-text available
Wireless optical code-division multiple access (OCDMA) is a new technique with many useful applications. Due to the limitation on power consumption and eye-safety requirements, wireless optical systems are power limited. Therefore control and efficient use of optical power is a key issue in analysis and design of these systems. Power control plays...
Article
Full-text available
In many wireless systems where multiuser detection techniques may be applied, The known linear multiuser detectors are designed for communication systems with additive white Gaussian noise(AWGN) assumption. In this regard, the question about the possibility and efficiency of their use in systems with non-Gaussian noise remains an open question. In...

Citations

... Some methods are even not disclosed (or only partly disclosed) as they have been patented e.g. [ [30], including a more brute but effective method, like SIM card cloning [27], [29], obviously it is difficult to ensure security, especially so, for mobile phones, as data signal is being transmitted to a free space. But Hoh has come up with the idea of distributing the data i.e. splitting the sensor's data and cloaking the user ID (in the ID proxy [18], p.20) to several parts. ...
... CDMA2000 uses Authentication key (A-Key) and Electronic Serial Number (ESN, in 2006 is replaced by MEID or Mobile Equipment ID which allows hexadecimal unlike just decimal digits in GSM). However, each has been proven to have its own strength and weakness [28]- [29]. ...
... With many scenarios of attacks [30], including a more brute but effective method, like SIM card cloning [27], [29], obviously it is difficult to ensure security, especially so, for mobile phones, as data signal is being transmitted to a free space. But Hoh has come up with the idea of distributing the data i.e. splitting the sensor's data and cloaking the user ID (in the ID proxy [18], p.20) to several parts. ...
Conference Paper
Full-text available
In the recent years, it has become readily more accepted that smart mobile phones with GPS or A-GPS enabled device, or even Cell-ID enabled, among the commuters, can be used as traffic sensor, which complements other traditional sensors. This development is pursued in the efforts of reducing or avoiding traffic jams. Consequently, this paper attempts to find a novel way to map match 2D local map with actual GPS traces from mobile phones. From a number of experiments, it has been found that Virtual Detection Zone method can be used to obtain 100% map matching, as it ensures matching by comparing the GPS data to a set of predetermined check points (circular VDZ, preferably with a radius of 50-185m). Furthermore, from this study, it is proposed to increase privacy, firstly by using OTP to doubly-lock the sensor's data. Secondly, by ensuring that valid data is only delivered from a significant distance of the user's private locations, and thirdly, by splitting the data to two parts before using OTP.
... CDMA2000 uses Authentication key (A-Key) and Electronic Serial Number (ESN, in 2006 is replaced by MEID or Mobile Equipment ID which allows hexadecimal unlike just decimal digits in GSM). However, each has been proven to have its own strength and weakness [28]- [29]. ...
... With many scenarios of attacks [30], including a more brute but effective method, like SIM card cloning [27], [29], obviously it is difficult to ensure security, especially so, for mobile phones, as data signal is being transmitted to a free space. But Hoh has come up with the idea of distributing the data i.e. splitting the sensor's data and cloaking the user ID (in the ID proxy [18], p.20) to several parts. ...
Conference Paper
Full-text available
In the recent years, it has become readily more accepted that smart mobile phones with GPS or A-GPS enabled device, or even Cell-ID enabled, among the commuters, can be used as traffic sensor, which complements other traditional sensors. This development is pursued in the efforts of reducing or avoiding traffic jams. Consequently, this paper attempts to find a novel way to map match 2D local map with actual GPS traces from mobile phones. From a number of experiments, it has been found that Virtual Detection Zone method can be used to obtain 100% map matching, as it ensures matching by comparing the GPS data to a set of pre-determined check points (circular VDZ, preferably with a radius of 50-185m). Furthermore, from this study, it is proposed to increase privacy, firstly by using OTP to doubly-lock the sensor’s data. Secondly, by ensuring that valid data is only delivered from a significant distance of the user’s private locations, and thirdly, by splitting the data to two parts before using OTP.
... While communications between a mobile phone handset and cell tower were designed with security in mind, apparent weaknesses exist that can be exploited. Researchers in Korea assembled equipment that was used to monitor a CDMA system [Hyu06], while researchers in Israel and the U.S. have found effective ways to crack the encoding system for GSM cell phone networks to enable eavesdropping [Bar03,Kir08,Nar08]. Specialized intercept equipment for law enforcement surveillance of cell phone traffic also exists [Bea07]. ...
Article
Full-text available
The purpose of this paper is to introduce a research proposal designed to explore the network securityissues concerning mobile devices protection. Many threats exist and they harm not only computers but handheld devices as well. The mobility of phones and their excessive use make them more vulnerable. The findings suggest a list of protections that can provide high level of security for new mobile devices.
Conference Paper
Through analyze the structure of the channel, we find there is an inherent signal feature on the plaintext in IS-95 CDMA system. Based on it, a new ciphertext-only attack method is proposed, which can solve the initial phase of the key sequence by eavesdropping 20ms ciphertext frame. By exploiting the linear relations between the key sequence and the state of the long code generator, an algorithm for decoding the private mask is proposed. Hence, the voice encryption of IS-95 system is provably unsecure against ciphertext-only attack. Direct against the safety defect of IS-95 system and possible attack methods, we propose a new enhancement scheme to improve the security architecture of IS-95 system.
Article
The use of communication networks and intelligent electronic devices (IEDs) for power systems is becoming more common and more necessary. Changes in the power system structure, changes in requirements and the necessity to have easy access to accurate data have led to the need for communication systems. Due to these changes, communication systems with IEDs in power companies expose the safety-critical power companies' network to the multitude security problems of communication networks. This paper proposes a method called multiple channel secure acknowledging multicast, which merges the tasks of acknowledgment and key changes in a simple and direct manner to make exposed IEDs more secure in distribution automation.