2022
DOI: 10.35784/iapgos.2877
|View full text |Cite
|
Sign up to set email alerts
|

Methods for Ensuring Data Security in Mobile Standards

Abstract: The analysis of mobile communication standards is carried out, the functional structure and interfaces of interaction between the structural elements of the cellular network are considered. To understand the principle of communication according to the GSM standard, a block diagram of a mobile switching center (MSC), base station equipment (BSS), control and service center (MCC), mobile stations (MS) is presented. The main algorithms for ensuring the confidentiality and security of mobile subscribers' data, in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 20 publications
(20 reference statements)
0
4
0
Order By: Relevance
“…For information estimation of the system "researched objectmeasuring instrument" the concept of entropy is introduced in the information theory. Entropy is the average amount of information per message [9].…”
Section: Fig 1 the Results Of Mathematical Modeling Of Internet Traff...mentioning
confidence: 99%
See 1 more Smart Citation
“…For information estimation of the system "researched objectmeasuring instrument" the concept of entropy is introduced in the information theory. Entropy is the average amount of information per message [9].…”
Section: Fig 1 the Results Of Mathematical Modeling Of Internet Traff...mentioning
confidence: 99%
“…𝑝(𝑎 𝑖 < 𝑥 < 𝛽 𝑖 ) = ∫ 𝜑(𝑋)𝑑𝑥 𝛽 𝑖 𝑎 𝑖 (11) Determining the probabilities of the values of the parameter in all intervals of the partition, according to Shannon's formula (9), we can obtain an estimate of the entropy in this case.…”
Section: Fig 2 Distribution Of the Measured Valuementioning
confidence: 99%
“…This state can be taken by mistake for equipment refusal (and vice versa). Therefore, control and removal of overloads are important tasks of a statistical character [14].…”
Section: Introductionmentioning
confidence: 99%
“…One of the most important functions of effective protection of the organization's information system is threat tracking and analysis and calculation of quantitative indicators of the functional properties of the security of content distributed in networks [1,3,5,8,9,12,19]. In [11] methods for ensuring data security in mobile standards are presented. Some methods can be used in programming level with biometric technical realization [16].…”
Section: Introductionmentioning
confidence: 99%