submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Indexed in Scopus

Journal of Cyber Security and Mobility

Ashutosh Dutta, Johns Hopkins University, USA
Ruby Lee, Princeton University, USA
Neeli R. Prasad, International Technological University, San Jose, USA
Wojciech Mazurczyk, Warsaw University of Technology, Poland

ISSN: 2245-1439 (Print Version),

ISSN: 2245-4578 (Online Version)
Vol: 1   Issue: 4

Published In:   October 2012

Publication Frequency: Quarterly

Search Available Volume and Issue for Journal of Cyber Security and Mobility

Journal Description        Editorial Foreword        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

Realization of Interworking in LTE Roaming Using a Diameter-Based Interworking Function

ArnabDey, Balaji Rajappa and Lakshman Bana

Engineering, Diametriq, Melbourne, USA

Abstract: [+]    |    Download File [ 1906KB ]

Abstract: While operators around the world are onboarding or planning to onboard the LTE-based Evolved Packet System (EPS), some troubling questions linger on. The prospects of LTE are enticing. However, would the LTE and Legacy networks interwork and co-exist? Would inbound/outbound roamers face any service disruption? For a green-field operator, possibly with a tight budget, is adopting LTE a risky proposition when over 90% of the world’s network is still based on Legacy Signaling System No. 7 (SS7)? Various standards bodies have provided guidelines and specifications to identify and address some of the interworking and co-existence scenarios, but their implementation is complex and requires a detailed knowledge of the disparate worlds of EPS and Legacy protocols in finding an acceptable intersection between the two.

This paper describes the important interworking issues between Diameter and TCAP (SS7)-based protocols and some of the practical aspects that transcend information that is disseminated through the standards bodies. Some specific scenarios such as a 2G/3G subscriber roaming into an LTE network using home-routed applications and S8 (EPS) –Gp(Legacy) interworking are not covered here and shall be discussed in a subsequent paper. Similarly, this paper has not focused on Diameter–RADIUS interworking needed to support RADIUS-based AAA Server. However, most other scenarios have been addressed and it is hoped that the solution presented here will alleviate the roaming, co-existence and interworking concerns of the reader.

Keywords: IWF, interworking, diameter, TCAP, LTE, MAP, CAP

Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

Parikshit N. Mahalle, Bayu Anggorojati, Neeli R. Prasad and Ramjee Prasad

Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark

Abstract: [+]    |    Download File [ 5041KB ]

Abstract: In the last few years the Internet of Things (IoT) has seen widespreadapplication and can be found in each field. Authentication and accesscontrol are important and critical functionalities in the context of IoTto enable secure communication between devices. Mobility, dynamicnetwork topology and weak physical security of low power devices in IoTnetworks are possible sources for security vulnerabilities. It ispromising to make an authentication and access control attack resistant andlightweight in a resource constrained and distributed IoT environment.This paper presents the Identity Authentication and Capability basedAccess Control (IACAC) model with protocol evaluation and performanceanalysis. To protect IoT from man-in-the-middle, replay and denial ofservice (Dos) attacks, the concept of capability for access control isintroduced. The novelty of this model is that, it presents an integratedapproach of authentication and access control for IoT devices. Theresults of other related study have also been analyzed to validate andsupport our findings. Finally, the proposed protocol is evaluated byusing security protocol verification tool and verification results showsthat IACAC is secure against aforementioned attacks. This paper alsodiscusses performance analysis of the protocol in terms of computationaltime compared to other existing solutions. Furthermore, this paper addresseschallenges in IoT and security attacks are modelled with the use casesto give an actual view of IoT networks.

Keywords: access control, authentication, capability, Internet of Things

The Number continuity service, Part I GSM <-> Satellite phone

Arnaud Henry-Labordère

HALYS, Paris, France and PRISM-CNRS, Versailles, France

Abstract: [+]    |    Download File [ 8263KB ]

Abstract: Mobile Number Portability is now a widely used service allowing users to keep their number if they change their subscribed operator. It was first deployed in Hong-Kong (1999). « Number Continuity » corresponds to the same service but with the switch to another technology, because the subscribed main terminal does not have coverage. The new terminal may be a PC, a smartphone / WiFi, a “satphone”, a GSM phone if the main one is CDMA, with (almost) the same service transparently. Making calls or SMS with its normal CLI shown, receiving calls, SMS, MMS to his normal GSM number (unlike « Skype »). This article explains the GSM <-> satphone number continuity implementation. The Geostationnary and Low Earth Orbit characteristics are presented as well the consequences of orbit drifts for which the exact computation is given based on the formal integration of Kepler's area law. The handover implementation and cases for the satellite service are explained. The constellation and services of the main satellite operators are compared. The telecom core network implementation of the service is detailed in the cases of a GSM type core network and an IS-41 (CDMA) core network.

Keywords: GSM<->CDMA (IS-41) and GSM<->WiFi

Mobility and Spatio-Temporal Exposure Control Exposure Control as a Primary Security and Privacy Tool Regarding Mobility, Roaming Privacy and Home Control

Geir M. Køien

University of Agder, Norway

Abstract: [+]    |    Download File [ 649KB ]

Abstract: Modern risk assessment methods cover many issues and encompass both risk analysis and corresponding prevention/mitigation measures.However, there is still room for improvement and one aspect that may benefit from more work is “exposure control”.The “exposure” an asset experiences plays an important part in the risks facing the asset.Amongst the aspects that all too regularly get exposed is user identities and user location information,and in a context with mobile subscriber and mobility in the service hosting (VM migration/mobility) the problems associated with lost identity/location privacy becomes urgent.In this paper we look at “exposure control” as a way for analyzing and protecting user identity and user location data.

Keywords: exposure control, vulnerability, risk, identity privacy, location privacy, home control, mobility,cloud, roaming privacy

River Publishers: Journal of Cyber Security and Mobility