Global System for Mobile Communications 

Get Complete Project Material File(s) Now! »

Introduction

The evolution of information and technology (ICT) has arguably progressed through four clearly denable phases since the invention of the personal computer (PC). The introduction of a graphical user interface (UI) was the next signicant milestone providing for ease of use an  visual interaction. Suddenly we found ourselves in the Internet era, connectivity and communication among PC users was now possible on a global scale.
Today is the turn of the social network, where individuals rush to publish personal and sometimes private information about themselves using any medium available on the Internet. There has been a recent explosion in popularity of social networking sites such as myspace [11], facebook [161] and linkedIn [79]. Some of the issues raised regarding social networking sites concern the security and privacy of personal information and indeed the value of privacy in monetary terms [89]. This has led to a renewed interest in privacy and privacy preservation and techniques of ensuring the individual’s privacy in a social and communicative context.
What the Internet did for the PC, so the introduction of the mobile phone did for telecommunications. Everyone with a mobile device became instantly connected and accessible, anywhere, anytime. However, like in the evolution of the personal computer, security and privacy has an ever increasing signicance in the evolution of telecommunications. The individual’s awareness of exposure of private information on the Internet has trickled over to the mobile communications space.
As mobile technologies are usually maintained by an underlying controlling authority, access to, dissemination of and the capturing of network events for communicative, statistical and billing purposes increase the risk of possible privacy infringement.

READ  THE PSYCHOLOGY OF THE ENTREPRENEUR

1 Introduction 
1.1 Privacy
1.1.1 Why Privacy is Important?
1.1.2 Privacy, Information Spaces and Expected Flow .
1.1.3 Privacy Techniques .
1.2 Privacy Protection
1.2.1 The Law and Privacy Protection
1.2.2 Privacy-Enhancing Technologies (PET)
1.3 Security and Privacy Concerns in Wireless and Mobile Computing
1.4 Problem Statement
1.5 Methodology
1.6 Structure an
2 Global System for Mobile Communications 
2.1 Introduction
2.2 GSM Architecture
2.2.1 Mobile station
2.2.2 Base Station Subsystem
2.2.3 Network Switching Subsystem
2.2.4 Operation Subsystem
2.3 GSM Security Model
2.4 Problems with GSM Security
2.5 Conclusion
3 GSM Privacy 
3.1 Introduction
3.2 Mobile Communication Privacy Concerns

3.3 Conclusion
4 Private Mobile Voice Communications Modelling 
4.1 Introduction .
4.2 Private Mobile Voice Communications Architecture
4.3 Formal High-Level Private Mobile Voice Communications Modelling
4.4 Mobile Communications Network Components
4.5 Formal Mobile Communication Requirements
4.6 Formal Mobile Voice Communications Privacy Requirements
4.6.1 Formal Sender and Receiver Privacy Requirements
4.6.2 Formal Numbering Scheme Privacy Requirements
4.6.3 Formal Location Privacy Requirements
4.6.4 Formal Communications Channel Privacy Requirements
4.6.5 Formal Billing Privacy Requirements
4.6.6 Formal Roaming Privacy Requirements
4.7 Perfect versus Practical Privacy Property Denitions
4.7.1 Formal Denition of Roaming Anonymity
4.7.2 Formal Denition of Roaming Event Unlinkability
4.8 Formal Denition of a High-Level Mobile Privacy Policy
4.8.1 Denition of an EPAL Mobile Communications Privacy
Policy
4.9 Conclusion
5 Sender and Receiver Privacy

6 Numbering Scheme Privacy

7 Billing Privacy

8 Roaming Privacy 

GET THE COMPLETE PROJECT

Related Posts