Search In this Thesis
   Search In this Thesis  
العنوان
Authentication protocols in cellular systems /
الناشر
Wissam Gamal El Din Ibrahim Hendy ,
المؤلف
Hendy, Wissam Gamal El Din Ibrahim
هيئة الاعداد
باحث / وسام جمال الدين ابراهيم هندى
مشرف / سعيد محمد النوبى
saidelnoubi@yahoo.com
مشرف / شوقى السيد محمد شعبان
shawki.shaabam@yahoo.com
مناقش / مظهر بسيونى طايل
مناقش / مصطفى عبد المولى نوفل
الموضوع
Authentication protocols .
تاريخ النشر
2002 .
عدد الصفحات
151 P. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/9/2002
مكان الإجازة
جامعة الاسكندريه - كلية الهندسة - الهندسه الكهربائيه
الفهرس
Only 14 pages are availabe for public view

from 16

from 16

Abstract

In the very small world we are living today there are multiple and diverse communication means one of the most popular communication technologies is the mobile communication there are hundred million using their cellular phones allover the world to day in the new mobile system user will be allowed to have a universal wireless access to multiple service therefore information security is a main issue. Mobile communication security has two principals objective the first is the authenticity and the second is the secrecy prevent unauthorized modification of data and the secrecy prevent unousorised detection of data always there is a security war between the system designer and the fraudster and the security system development is the direct result of this war. This thesis present a survey on authentication protocols n some famous cellular system and suggest solution for the ( s-4 ) authentication protocol flaws the thesis is organized as follows : chapter one briefly reviews the basic of the information security chapter two introduce a survey on the anticipation protocols in some famous cellular system such as GSM , IS-98 and IS 41 chapter three present the is-41 authentication protocol flaws chapter four proposes the suggested solution for the is-41 authentication protocol flaws and also the evolution for thesis solution finally chapter five present the conclusion and the suggested future work