Towards Secure 4G and 5G Access Network Protocols

Total Page:16

File Type:pdf, Size:1020Kb

Towards Secure 4G and 5G Access Network Protocols Towards Secure 4G and 5G Access Network Protocols vorgelegt von Altaf Shaik (M.Sc.) ORCID: 0000-0003-2657-6975 von der Fakultät IV - Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades DOKTOR DER INGENIEURWISSENSCHAFTEN (Dr.-Ing.) genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz, Technische Universität Berlin Gutachter: Prof. Dr. Jean-Pierre Seifert, Technische Universität Berlin Gutachter: Prof. Dr. Ivan Martinovic, University of Oxford Gutachter: Prof. Dr. Abhay Karandikar, Indian Institute of Technology Kanpur Tag der wissenschaftlichen Aussprache: 24. Juni 2020 Berlin 2020 Abstract The security architecture of 2G and 3G mobile networks has been dramatically improved to accommodate 4G (Fourth Generation, a.k.a Long Term Evolution (LTE)) security requirements. As generations evolve, security improvements address pre- viously known vulnerabilities, esp. in terms of user privacy. Thus, there have been substantial efforts to protect user plane traffic by using robust encryption algorithms over the LTE access network. Contrarily, the control plane remains vulnerable despite its security enhancements. Especially, the radio and subscriber management protocols have not evolved for the last two decades in mobile networks. By design, these proto- cols are allowed to operate without any security measures to minimize overheads in the system. Such design choices made by the standard body Third Generation Part- nership Project (3GPP) are justified as a trade-off between conflicting requirements such as security and availability and performance. These justifications remain valid, considering that telecommunication systems have traditionally been proprietary, expensive, and efforts to mount attacks against them were challenging. Today, the proliferation of inexpensive radio hardware and open-source cellular software has changed the threat landscape in mobile networks. In this context, our research practically investigates the validness of LTE security trade-offs. For this, we develop a low-cost experimental testbed to mount different types of wireless attacks and evaluate their feasibility and impact on commercial LTE devices and networks. We discover several new vulnerabilities in the access network protocols that jeopardize the privacy and availability aspects of the system. We also identify bad security practices in end-user devices and the operator’s infrastructure that catalyze our attacks and further, amplify its consequences. Our findings indicate that the equilibrium points in the trade-offs have changed today compared to where they were when designing the LTE security architecture. Also, the security margins to protect against trade-off changes being too narrow demonstrates the lack of resilience in LTE networks. Unlike jamming or other types of Denial-of- Service (DoS) attacks, ours are stealthy and remain active on end-user devices for a prolonged period. iii To this extent, we responsibly communicated our research findings to the relevant standard bodies, operators, and baseband vendors. We emphasize that the justifica- tion for these trade-offs is no longer valid and violates LTE security requirements. Thus, we propose mitigations to restore privacy and availability aspects of the sys- tem, and fortunately, they are enforced into 4G and 5G specifications and also into worldwide operational devices and networks. We recommend that safety margins introduced into future specifications should incorporate greater agility and flexibility to maintain a stable trade-off equation. Zusammenfassung Die Sicherheitsarchitektur von 2G und 3G Mobilfunknetzen wurde stark überarbeitet und verbessert, um den Sicherheitsanforderungen, die an 4G (Fourth Generation, auch bekannt als LTE (Long Term Evolution)) gestellt werden, gerecht zu werden. Mit jeder neuen Generation wurden die Sicherheitsstandards verbessert, um neu bekanntgewordene Sicherheitslücken zu beheben, insbesondere im Hinblick auf die Privatsphäre der Nutzer. Es wurden erhebliche Anstrengungen unternommen, um die LTE-Userplane bei der Übertragung im LTE Netz mittels robuster Verschlüs- selungsalgorithmen zu schützen. Im Gegensatz hierzu ist die Controlplane, trotz einiger Sicherheitsverbesserungen, weiterhin verwundbar. Insbesondere der Betrieb von Funk- und Abonnentenmanagementprotokollen hat sich für Mobilfunknetzte in den letzten zwei Jahrzehnten nicht weiterentwickelt. Diese Protokolle sind ohne notwendige Verschlüsselung konzipiert, um die Systemlast minimal zu halten. Diese Entscheidungen werden durch das Standardorgan 3GPP (Third Generation Partnership Project) getroffen und werden mit einem Kompromiss zwischen den widersprüchlichen Anforderungen der Sicherheit und Verfügbarkeit auf der einen, und der Leistung auf der anderen Seite, begründet. Diese Rechtfertigungen sind weiterhin gerechtfertigt, da Telekommunikationssysteme traditionell proprietär und teuer sind und Angriffe gegen Telekommunikationssysteme eine Herausforderung darstellten. Heutzutage hat sich angesichts der Verbreitungen günstiger Funk-hardware und Open-Source Mobilfunk Software die Bedrohungslage in Mobilfunknetzen stark verändert. Vor diesem Hintergrund untersucht unsere Forschung praxisnah die Gültigkeit der Trade-Offs im Design der LTE Sicherheitsarchitektur. Hierzu entwick- iv eln wir eine günstige experimentelle Testumgebung, um verschiedene drahtlose An- griffe durchzuführen und ihre Auswirkung auf kommerzielle Geräte und Netzwerke zu evaluieren. Wir entdecken eine Reihe an bis dato unbekannten Sicherheitslücken in den LTE Zugangsprotokollen, welche die Vertraulichkeit und Verfügbarkeit der Systeme gefährden. Darüber hinaus identifizieren wir sicherheitskritische Praktiken bei Implementierungen für Endbenutzergeräte und in der Infrastruktur der Netz- betreiber, die von Standard Sicherheitsverfahren abweichen und dadurch unsere Attacken beschleunigen und ihre Konsequenzen erhöhen. Unsere Ergebnisse deuten darauf hin, dass sich das Gleichgewicht zwischen Sicher- heit und Leistung, im Vergleich zu dem Stand, als die LTE Sicherheitsarchitektur entworfen wurde, verschoben hat. Desweiteren stellen sich die Sicherheitsspiel- räume, die gegen Veränderungen der Trade-Offs schützen sollen, als zu gering heraus. Anders als bei Jamming- und Flooding-basierten Angriffen laufen unsere Angriffe im Generellen unbemerkt ab und können für einen längeren Zeitraum auf dem Endbenutzergerät aktiv bleiben. Wir haben unsere Forschungsergebnisse verantwortungsbewusst an die relevanten Standardorganisationen, Betreiber und Basisbandanbieter gemeldet. Wir betonen, dass die eingegangenen Kompromisse nicht mehr zu rechtfertigen sind und eine die LTE Sicherheitsanforderungen nicht erfüllen. Wir schlagen daher Maßnahmen vor, um die Aspekte, welche die Vertraulichkeit und Verfügbarkeit des Systems betreffen, wiederherzustellen. Glücklicherweise werden diese Maßnahmen in den 4G und 5G Spezifikationen sowie in den weltweiten Netzen der Betreiber umgesetzt. Wir empfehlen, dass Sicherheitsspielräume, die in künftige Spezifikationen aufgenom- men werden, eine größere Agilität beinhalten sollten, um späteren Änderungen des Kompromissgleichgewichts Rechnung zu tragen. v Publications Related to this Thesis The work presented in this thesis resulted in the following peer-reviewed publica- tions: • New Vulnerabilities in 4G and 5G Cellular Access Network Protocols: Exposing Device Capabilities, Altaf Shaik, Ravishankar Borgaonkar, Shinjo park, & Jean- Pierre Seifert, In the proceedings of 12th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2019 (ACM WiSec). • New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols, Ravishankar Borgaonkar, Lucas Hirschi, Shinjo Park, & Altaf Shaik, In the proceedings of 20th Privacy Enhancing Technologies Symposium, 2019 (PETS). • On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks, Altaf Shaik, Ravishankar Borgaonkar, Shinjo park, & Jean-Pierre Seifert, In the proceedings of 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018 (ACM WiSec). • Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communica- tion Systems, Altaf Shaik, Ravishankar Borgaonkar, Asokan N, Valtteri Niemi, & Jean-Pierre Seifert, In the proceedings of 23rd Annual Network & Distributed System Security Symposium, 2016 (NDSS). vii Contents 1 Introduction 1 1.1 Motivation and Problem Statement . 1 1.2 Hypothesis and Methodology . 4 1.3 Scientific Contribution and Impact . 5 1.4 Thesis Structure . 7 2 Background 9 2.1 LTE Network Architecture . 9 2.1.1 UE . 10 2.1.2 E-UTRAN . 10 2.1.3 MME in EPC . 10 2.2 LTE Network Procedures . 11 2.2.1 UE/Subscriber Registration . 11 2.2.2 Security . 13 2.2.3 Paging . 16 2.2.4 Handover . 18 2.2.5 Self Organized Network (SON) . 19 2.3 Related Work . 21 2.3.1 Privacy Attacks . 21 2.3.2 Denial of Service Attacks . 23 2.3.3 Security Testing Framework . 24 2.3.4 Low-Powered IoT attacks . 25 3 Low Cost Tools: LTE Testbed and Threat Modelling 27 3.1 IMSI Catchers . 28 3.2 LTE Experimental Testbed . 29 3.2.1 Hardware . 29 3.2.2 Software . 32 3.3 LTE Threat Landscape . 33 3.3.1 Adversary Modelling . 33 3.3.2 Building Rogue LTE Components . 34 3.3.3 Ethical Considerations . 40 ix 4 Trading Security for Availability 41 4.1 Security Weaknesses in LTE Radio Network Management . 42 4.1.1 Broadcast Information . 42 4.1.2 Measurement Reporting . 43 4.1.3 SON Features . 44 4.2 Compromising LTE Subscriber Privacy: Location Leaks . 47 4.2.1 Location leak enablers
Recommended publications
  • Openairinterface: Democratizing Innovation in the 5G Era
    Computer Networks 176 (2020) 107284 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet OpenAirInterface: Democratizing innovation in the 5G Era Florian Kaltenberger a,∗, Aloizio P. Silva b,c, Abhimanyu Gosain b, Luhan Wang d, Tien-Thinh Nguyen a a Eurecom, France b Northeastern University, Massachusetts, United States c US Ignite Inc. PAWR Project Office, Washington DC, United States d Beijing University of Posts and Telecommunications, Beijing, China a r t i c l e i n f o a b s t r a c t 2019 MSC: OpenAirInterface TM (OAI) is an open-source project that implements the 3rd Generation Partnership Project 00-01 (3GPP) technology on general purpose x86 computing hardware and Off-The-Shelf (COTS) Software Defined 99-00, Radio (SDR) cards like the Universal Software Radio Peripheral (USRP). It makes it possible to deploy and operate Keywords: a 4G Long-Term Evolution (LTE) network today and 5G New Radio (NR) networks in the future at a very low Open Air Interface cost. Moreover, the open-source code can be adapted to different use cases and deployment and new functionality 5G can be implemented, making it an ideal platform for both industrial and academic research. The OAI Software New radio technology Alliance (OSA) is a non-profit consortium fostering a community of industrial as well as research contributors. Network softwarization It also developed the OAI public license which is an open source license that allows contributors to implement LTE their own patented technology without having to relinquish their intellectual property rights.
    [Show full text]
  • Etsi Tr 121 905 V11.2.0 (2012-10)
    ETSI TR 121 905 V11.2.0 (2012-10) Technical Report Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Vocabulary for 3GPP Specifications (3GPP TR 21.905 version 11.2.0 Release 11) 3GPP TR 21.905 version 11.2.0 Release 11 1 ETSI TR 121 905 V11.2.0 (2012-10) Reference RTR/TSGS-0021905vb20 Keywords GSM,LTE,UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]
  • UMTS); Radio Interface Protocol Architecture (3GPP TS 25.301 Version 3.8.0 Release 1999)
    ETSI TS 125 301 V3.8.0 (2001-06) Technical Specification Universal Mobile Telecommunications System (UMTS); Radio Interface Protocol Architecture (3GPP TS 25.301 version 3.8.0 Release 1999) 3GPP TS 25.301 version 3.8.0 Release 1999 1 ETSI TS 125 301 V3.8.0 (2001-06) Reference RTS/TSGR-0225301UR5 Keywords UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.:+33492944200 Fax:+33493654716 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://www.etsi.org/tb/status/ If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 2001.
    [Show full text]
  • Communications Technology Assessment for the Unmanned Aircraft System (UAS) Control and Non-Payload Communications (CNPC) Link
    NASA/CR—2014-216675 Communications Technology Assessment for the Unmanned Aircraft System (UAS) Control and Non-Payload Communications (CNPC) Link Steven C. Bretmersky MTI Systems, Inc., Cleveland, Ohio William D. Bishop Verizon Federal Network Systems, LLC., Arlington, Virginia Justin E. Dailey MTI Systems, Inc., Cleveland, Ohio Christine T. Chevalier Vantage Partners, LLC, Brook Park, Ohio June 2014 NASA STI Program . in Profi le Since its founding, NASA has been dedicated to the • CONFERENCE PUBLICATION. Collected advancement of aeronautics and space science. The papers from scientifi c and technical NASA Scientifi c and Technical Information (STI) conferences, symposia, seminars, or other program plays a key part in helping NASA maintain meetings sponsored or cosponsored by NASA. this important role. • SPECIAL PUBLICATION. Scientifi c, The NASA STI Program operates under the auspices technical, or historical information from of the Agency Chief Information Offi cer. It collects, NASA programs, projects, and missions, often organizes, provides for archiving, and disseminates concerned with subjects having substantial NASA’s STI. The NASA STI program provides access public interest. to the NASA Aeronautics and Space Database and its public interface, the NASA Technical Reports • TECHNICAL TRANSLATION. English- Server, thus providing one of the largest collections language translations of foreign scientifi c and of aeronautical and space science STI in the world. technical material pertinent to NASA’s mission. Results are published in both non-NASA channels and by NASA in the NASA STI Report Series, which Specialized services also include creating custom includes the following report types: thesauri, building customized databases, organizing and publishing research results. • TECHNICAL PUBLICATION.
    [Show full text]
  • TR 101 865 V1.1.1 (2001-07) Technical Report
    ETSI TR 101 865 V1.1.1 (2001-07) Technical Report Satellite Earth Stations and Systems (SES); Satellite component of UMTS/IMT-2000; General aspects and principles 2 ETSI TR 101 865 V1.1.1 (2001-07) Reference DTR/SES-00054 Keywords satellite, UMTS, IMT-2000, 3GPP ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.:+33492944200 Fax:+33493654716 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://www.etsi.org/tb/status/ If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 2001. All rights reserved. ETSI 3 ETSI TR 101
    [Show full text]
  • E3 - Gsgsn 121 3
    US008279831 B2 (12) United States Patent (10) Patent No.: US 8.279,831 B2 Sengupta et al. (45) Date of Patent: Oct. 2, 2012 (54) SYSTEM, METHOD, AND 2005/0159.153 A1 7/2005 Mousseau et al. COMPUTER-READABLE MEDIUM FOR 2005/02491.61 A1 11/2005 Carlton 2006, OO25151 A1 2/2006 Karaoguz et al. SELECTING ANETWORK FOR 2007/0014281 A1 1/2007 Kant ............................. 370,352 CONNECTIVITY AND HANDOVER BASED 2007/0032239 A1 2/2007 Shaheen et al. ON APPLICATION REQUIREMENTS 2007/0115899 A1 5/2007 Ovadia et al. 2007/0173283 A1* 7, 2007 Livet et al. ................. 455,552.1 (75) Inventors: Chaitali Sengupta, Richardson, TX (US); Yuan Kang Lee, San Diego, CA FOREIGN PATENT DOCUMENTS (US) WO WO O2, 19736 A2 3, 2002 WO WO 2004/100452 A1 11, 2004 (73) Assignee: SNRLab Corporation, Richardson, TX W. W. 3988, A: (39. OTHER PUBLICATIONS (*) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 PCT International Preliminary Examining Authority—European U.S.C. 154(b) by 1059 days Patent Office, PCT Notification of Transmittal of the International M YW- Preliminary Report on Patentability mailed Feb. 6, 2009, Interna (21) Appl. No.: 11/929,066 tional Application No. PCT/US2007/083129, filed Oct. 31, 2007, 11 pages, NL-2280 HV Rijswijk. 1-1. 3GPP SA WG2, 3rd Generation Partnership Project: Technical (22) Filed: Oct. 30, 2007 Specification Group Services and Architecture; Feasibility Study on O O Multimedia Session Continuity; Stage 2: (Release 8), 3GPP TR (65) Prior Publication Data 23.893 (Oct. 2007), 3GPP Technical Recommendation, Oct.
    [Show full text]
  • Method of Handling Non-Access Stratum Message and Related Communication Device
    (19) TZZ Z_T (11) EP 2 704 456 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: (51) Int Cl.: 05.03.2014 Bulletin 2014/10 H04W 4/00 (2009.01) H04W 76/02 (2009.01) (21) Application number: 13181635.7 (22) Date of filing: 25.08.2013 (84) Designated Contracting States: (71) Applicant: HTC Corporation AL AT BE BG CH CY CZ DE DK EE ES FI FR GB Taoyuan County 330 (TW) GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR (72) Inventor: Liao, Ching-Yu Designated Extension States: 330 Taoyuan City (TW) BA ME (74) Representative: Konkonen, Tomi-Matti Juhani (30) Priority: 29.08.2012 US 201261694276 P Murgitroyd & Company 22.08.2013 US 201313974005 Scotland House 165-169 Scotland Street Glasgow G5 8PL (GB) (54) Method of Handling Non-Access Stratum Message and Related Communication Device (57) Amethod ofhandling non- accessstratum (NAS) level to a network in the wireless communication system, mobility management (MM) messages for a user equip- and storing a priority indicator indicating the first priority ment in a wireless communication system when the user level in a nonvolatile memory if the user equipment re- equipment is configured for dual priority includes sending ceives a NAS MM reject message with a mobility man- a first NAS MM request message containing a first priority agement back-off (MMBK) timer from the network. EP 2 704 456 A1 Printed by Jouve, 75001 PARIS (FR) 1 EP 2 704 456 A1 2 Description the clear of the PPF, the core network cannot page the UE during the period of the implicit detach timer.
    [Show full text]
  • Osmohnbgw User Manual I
    OsmoHNBGW User Manual i sysmocom - s.f.m.c. GmbH OsmoHNBGW User Manual by Harald Welte Copyright © 2019 sysmocom - s.f.m.c.DRAFT GmbH Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with the Invariant Sections being just ’Foreword’, ’Acknowledgements’ and ’Preface’, with no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". The Asciidoc source code of this manual can be found at http://git.osmocom.org/osmo-hnbgw/ and of the common chapters at http://git.osmocom.org/osmo-gsm-manuals/ DRAFT 0.7.0-4-g1f6c, 2021-Feb-23 OsmoHNBGW User Manual ii HISTORY NUMBER DATE DESCRIPTION NAME 1 November 30th, Initial version HW 2019 Copyright © 2019 sysmocom - s.f.m.c. GmbH DRAFT 0.7.0-4-g1f6c, 2021-Feb-23 OsmoHNBGW User Manual iii Contents 1 Foreword 1 1.1 Acknowledgements..................................................1 1.2 Endorsements.....................................................2 2 Preface 2 2.1 FOSS lives by contribution!..............................................2 2.2 Osmocom and sysmocom...............................................2 2.3 Corrections......................................................3 2.4 Legal disclaimers...................................................3 2.4.1 Spectrum License...............................................3 2.4.2 Software License...............................................3
    [Show full text]
  • Putting LTE Security Functions to the Test: a Framework to Evaluate Implementation Correctness
    Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness David Rupprecht Kai Jansen Horst Gortz¨ Institute for IT-Security Horst Gortz¨ Institute for IT-Security Ruhr-University Bochum, Germany Ruhr-University Bochum, Germany [email protected] [email protected] Christina Popper¨ New York University Abu Dhabi [email protected] Abstract promise of users as well as service providers. Security- related changes need to be carefully evaluated in order to Long Term Evolution (LTE) is the most recent generation maintain strong protection, especially since LTE is con- of mobile communications promising increased transfer sidered as the communication technology for, e. g., criti- rates and enhanced security features. It is todays commu- cal infrastructures, emergency services, and law enforce- nication technology for mobile Internet as well as con- ment [12]. The increasing dependency on LTE makes it sidered for the use in critical infrastructure, making it an an attractive subject to a wide range of attacks and any attractive target to a wide range of attacks. We evalu- vulnerability could have serious impact on the underly- ate the implementation correctness of LTE security func- ing services. tions that should protect personal data from compromise. By addressing several security issues of the previ- In this paper, we focus on two security aspects: user ous mobile communication specifications, in particular data encryption and network authentication. We de- Global System for Mobile Communications (GSM) and velop a framework to analyze various LTE devices with Universal Mobile Telecommunications System (UMTS), respect to the implementations of their security-related LTE raises the bar in terms of security and applies, e.
    [Show full text]
  • University of Bradford Ethesis
    University of Bradford eThesis This thesis is hosted in Bradford Scholars – The University of Bradford Open Access repository. Visit the repository for full metadata or to contact the repository team © University of Bradford. This work is licenced for reuse under a Creative Commons Licence. STUDY OF CONTINUOUS-PHASE FOUR- STATE MODULATION FOR CORDLESS TELECOMMUNICATIONS M. A. BOMHARA PhD UNIVERSITY OF BRADFORD 2010 STUDY OF CONTINUOUS-PHASE FOUR- STATE MODULATION FOR CORDLESS TELECOMMUNICATIONS Assessment by simulation of CP-QFSK as an alternative modulation scheme for TDMA digital cordless telecommunications systems operating in indoor applications Mohamed Ali BOMHARA BSc, MSc Submitted for the degree of Doctor of Philosophy Faculty of Engineering and Informatics University of Bradford 2010 Abstract STUDY OF CONTINUOUS-PHASE FOUR-STATE MODULATION FOR CORDLESS TELECOMMUNICATIONS Study of Continuous-Phase Four-State Modulation for Cordless Telecommunications Assessment by simulation of CP-QFSK as an alternative modulation scheme for TDMA Digital Cordless Telecommunications Systems operating in indoor applications Keywords TDMA; PCS; DECT; Coding; CPM; CP-QFSK; Modulation; OFDM; GMSK; WiFi; Femtocells; One of the major driving elements behind the explosive boom in wireless revolution is the advances in the field of modulation which plays a fundamental role in any communication system, and especially in cellular radio systems. Hence, the elaborate choice of an efficient modulation scheme is of paramount importance in the design and employment of any communications system. Work presented in this thesis is an investigation (study) of the feasibility of whether multilevel FSK modulation scheme would provide a viable alternative modem that can be employed in TDMA cordless communications systems.
    [Show full text]
  • 3G: UMTS Overview
    3G: UMTS overview David Tipper Associate Professor Graduate Telecommunications and Networking Program University of Pittsburgh 2700 Slides 12 3G Driving Factors • Subscriber base continues to grow 1 billion wireless subscribers in 2002 (surpassed Landline) • Predict 3 billion by 2008 800 Billion Mobile Revenues 2007 81%Voice, SMS 9.5%, All Other non- voice 9.5% Telcom 2720 2 3G Development • 1986 ITU began studies of 3G as: – Future Public Land Mobile Telecom. Systems (FPLMTS) – 1997 changed to IMT-2000 (International Mobile Telecom. in Year 2000) –ITU-Rstudying radio aspects, ITU-T studying network aspects (signaling, services, numbering, quality of service, security, operations) • IMT-2000 vision of 3G – 1 global standard in 1 global frequency band to support wireless data service – Spectrum: 1885-2025 MHz and 2110-2200 MHz worldwide – Multiple radio environments (phone should switch seamlessly among cordless, cellular, satellite) – Support for packet switching and asymmetric data rates • Target data rates for 3G – Vehicular: 144 kbps – Pedestrian: 384 kbps – Indoor office: 2.048 Mbps Æ roadmap to > 10Mbps late • Suite of four standards approved after political fight Telcom 2720 3 3G Requirements Seamless End to End Service with different data rates Satellite Global Suburban Urban In-Building Macro-cell Micro-cell Pico-cell up to 2Mbps up to 144 kbps up to 384 kbps Telcom 2720 4 Third Generation Standards • ITU approved suite of four 3G standards •EDGE (Enhanced Data rates for Global Evolution) – TDMA standard with advanced modulation
    [Show full text]
  • Road to 5G: Introduction and Migration April 2018
    Road to 5G: Introduction and Migration April 2018 ROAD TO 5G: INTRODUCTION AND MIGRATION About the GSMA Future Networks Programme The GSMA represents the interests of mobile operators The GSMA’s Future Networks is designed to help operators worldwide, uniting nearly 800 operators with almost 300 and the wider mobile industry to deliver All-IP networks so companies in the broader mobile ecosystem, including that everyone benefits regardless of where their starting handset and device makers, software companies, point might be on the journey. equipment providers and internet companies, as well as The programme has three key work-streams focused on: organisations in adjacent industry sectors. The GSMA also The development and deployment of IP services, The produces industry-leading events such as Mobile World evolution of the 4G networks in widespread use today, The Congress, Mobile World Congress Shanghai, Mobile World 5G Journey developing the next generation of mobile Congress Americas and the Mobile 360 Series of technologies and service. conferences. For more information, please visit the Future Networks For more information, please visit the GSMA corporate website at: www.gsma.com/futurenetworks website at www.gsma.com. Follow the GSMA on Twitter: @GSMA. Document Editor Dongwook Kim, 5G Project Manager Michele Zarri, Technical Director – Networks Acknowledgement (5G Introduction Project Members) Applied Communication Sciences MediaTek Inc. ARM Ltd. Nokia AT&T Mobility NTT DOCOMO, Inc. Axiata Group Berhad OranGe China Mobile Limited Qualcomm Incorporated China Telecommunications Corporation SinGTel Mobile SinGapore Pte. Ltd. China Unicom SK Telecom Co., Ltd. Deutsche Telekom AG SoftBank Corp. DISH Network Corporation Sprint Corporation Ericsson Syniverse TechnoloGies, Inc GuanGdonG OPPO Mobile Telecommunications Corp.,Ltd.
    [Show full text]