In the last few years, we have witnessed an explosion in demand for security measures motivated by the proliferation of mobile/wireless networks, the fixedmobile network convergence, and the emergence of new services, such as ecommerce. 3G-systems play a key role in this network evolution, and thus, all stakeholders are interested in the security level supported in the new emerging mobile environment. This paper elaborates on the security framework in 3G mobile networks. The security requirements imposed by the different types of traffic, and by the different players involved (mobile users, serving network and service providers) are investigated. The security architecture, which comprises all the security mechanisms that are projected for the Universal Mobile Telecommunication System (UMTS) network, is analyzed. The employment of traditional security technologies, originally designed for fixed networking, such as firewalls, and static Virtual Private Network (VPN), in order to safeguard the UMTS core network from external attacks, as well as to protect user data when conveyed over the network are examined. Critical points in the 3G-security architecture that may cause network and service vulnerability are identified and discussed. Furthermore, proposals for the enhancement of the 3G-security architecture, and the provision of advanced security services to end-user data traffic within and outside the UMTS core network are discussed. The proposed enhancements can be easily integrated in the existing network infrastructure, and operate transparently to the UMTS network functionality.
[1]
Hugo Krawczyk,et al.
A Security Architecture for the Internet Protocol
,
1999,
IBM Syst. J..
[2]
Lazaros Merakos,et al.
Secure VPN Deployment in GPRS Mobile Networks
,
2001
.
[3]
Andrew G. Malis,et al.
A Framework for IP Based Virtual Private Networks
,
2000,
RFC.
[4]
Lazaros F. Merakos,et al.
Dynamic network-based secure VPN deployment in GPRS
,
2002,
The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.
[5]
Christos Xenakis,et al.
On demand network-wide VPN deployment in GPRS
,
2002,
IEEE Netw..
[6]
Dan Harkins,et al.
The Internet Key Exchange (IKE)
,
1998,
RFC.