Confidentiality in the UMTS Radio Access Network Simulation approach under OPNET
Author(s) -
Saïd El Hajji,
Ghizlane Orhanou
Publication year - 2009
Publication title -
electronic workshops in computing
Language(s) - English
Resource type - Conference proceedings
ISSN - 1477-9358
DOI - 10.14236/ewic/vecos2009.2
Subject(s) - umts frequency bands , umts terrestrial radio access network , computer science , computer network , encryption , confidentiality , feature (linguistics) , protocol stack , cellular network , radio access network , computer security , base station , mobile station , linguistics , philosophy , wireless sensor network
The Universal Mobile Telecommunications System (UMTS) offers a panoply of 3G services. In addition to delivery of images, graphics and video communications, UMTS is used for such applications as banking and e-commerce and hence security is a critical concern. In the present paper, we are interested in the confidentiality feature in the UMTS Network Access. Ciphering when applied is performed in the RNC and the UE either in the RLC sub-layer or in the MAC sub-layer. Our current research aims to examine exactly where the encryption/decryption occurs in the protocol stack of an UMTS network. And then introduce this security feature in the OPNET Modeler which is used to give a simulation approach of the use of the UTRAN confidentiality feature between RNC and UE. This paper is organized as follows. First, a brief description of the UMTS confidentiality mechanism. Then, We will be interested in the UMTS stack layers where the ciphering and deciphering of data would be performed. After, we will describe our simulation approach by exposing the changes made to mobile station and RNC node models in order to implement the confidentiality feature.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom