18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Wireless Technologies 355<br />

Most of the state-of-the-art IS-95 CDMA and IS-136 TDMA terminals<br />

support roaming <strong>to</strong> the analog first generation AMPS system (dual<br />

mode terminals). This is currently a major problem for the IS-95<br />

CDMA and IS-136 TDMA opera<strong>to</strong>rs as it also expands the AMPS<br />

system's lack of security <strong>to</strong> the 2G systems.<br />

GSM-based mobile systems provide mobile user authentication and<br />

security over the radio interface as an integrated part of the system. The<br />

GSM security is based on the trust between network opera<strong>to</strong>rs and on a<br />

shared secret key (Ki) s<strong>to</strong>red on the user-subscriber's identification<br />

module (SIM) and in the Authentication Center (AUC) of the opera<strong>to</strong>r.<br />

Third generation systems<br />

The third generation mobile systems (3G) will be available soon after<br />

the year 2002. The security of first and second-generation systems<br />

is based on the traditional telecom security model (separation of user<br />

data and signaling data). The third generation mobile systems will be<br />

IP-based and, at least partially, connected <strong>to</strong> the Internet. IP-networks<br />

are 'open networks', which do not separate signaling from the user<br />

data. This allows malicious users <strong>to</strong> exploit the faults of the pro<strong>to</strong>col<br />

stacks <strong>to</strong> gain access <strong>to</strong> data or network resources. The 3G systems<br />

have <strong>to</strong> adopt a new security policy and build an Internet-like security<br />

architecture (firewalls, virtual private networking, end-<strong>to</strong>-end encryption,<br />

etc.).<br />

12.4.2. Security issues in WAP<br />

WAP allows the introduction of hypertext services <strong>to</strong> mobile systems.<br />

The services are s<strong>to</strong>red on servers in the network and they are used<br />

with a browser program from the mobile terminal. Both the opera<strong>to</strong>r's<br />

network and the service provider's WAP servers can be connected <strong>to</strong><br />

the public Internet, thus exposing the WAP stack and servers <strong>to</strong> attacks.<br />

The main areas where security should be addressed are:<br />

• Security between the mobile phone and the antenna;<br />

• Security between the antenna and the WAP gateway; and<br />

• Security between WAP gateway and origin server.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!