СПОСОБИ ЗАХИСТУ ІНФОРМАЦІЇ В МОБІЛЬНИХ МЕРЕЖАХ
Анотація
Way to improve security of mobile networks
Examining types of attacks and way to protect mobile networks, increasing the efficiency of information security through using cryptography algorithms.
This paper gives general information about the standards of mobile communication, described attacks on mobile networks, discussed ways to protect mobile networks and both the GSM and UMTS, the program implemented block cipher KASUMI.
Посилання
Ветров Ю.В. Криптографические методы защиты информации в телекоммуникационных системах: учеб. пособие / Ю.В. Ветров, С.Б. Макаров. - СПб.: Издательство Политехника ун-та, 2011. - 174 с.
Куприянов А.И., Сахаров А.В., Швецов В.А. Основы защиты информации: учебное пособие для студентов высших учебных заведений. – М.: Издательский центр «Академия», 2006. – 256 с.
Чекалин А.А., ЗаряевА.В. Защита информации в системах мобильной связи: Учебное пособие для вузов. - М.: Горячая линия – Телеком, 2005. - 171с.
Ярочкин В.И. Безопасность информационных систем (Безопасность предпринимательства). – М.: Ось-89, 1996. – 318 с.
##submission.downloads##
Опубліковано
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2016 С. О. Зубик
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.