外文翻译----在sms蜂窝网络上进行开放式功能的开发(编辑修改稿)内容摘要:

mmon CCH and Dedicated CCHs. The Common CCH, which consists of logical channels including the Paging Channel (PCH) and Random Access Channel(RACH), is the 毕业设计(论文) 外文翻译 8 mechanism used by the base station to initiate the delivery of voice and SMS data. Accordingly, all connected mobile devices are constantly listening to the Common CCH for voice and SMS signaling. The base station sends a message on the PCH containing the Temporary Mobile Subscriber ID (TMSI) associated with the end destination. The work uses the TMSI instead of the targeted device’s phone number in order to thwart eavesdroppers attempting to determine the identity of the receiving phone. When a device hears its TMSI, it attempts to contact the base station over the RACH and alerts the work of its availability to receive ining call or text data. When the response arrives, the base station instructs the targeted device to listen to a specific Standalone Dedicated Control Channel (SDCCH). Using the SDCCH, the base station is able to facilitate authentication of the destination device (via the subscriber information at the MSC), enable encryption, deliver a fresh TMSI and then deliver the SMS message itself. In order to reduce overhead, if multiple SMS messages exist on the SMSC, more than one message may be transmitted over an SDCCH session [5]. If a voice call had been waiting at the base station instead of a text message,all of the above channels would have been used in the same manner to establish a connection on a traffic channel. An illustration of this final stage of delivery over the air interface is shown in Figure . Figure Simplified SMS air interface munication 2. SMS/CELLULAR NETWORK VULNERABILITY ANALYSIS The majority of legitimate uses for SMS can often be characterized as nonessential, ranging from social interactions to low priority businessrelated exchanges. The salient feature of these munications is that they can typically be acplished through a number of other, albeit potentially less convenient channels. During the terrorist attacks of September 11, 2020, however, the nature of text messaging proved to be far more utilitarian. With millions of people attempting to contact friends and family, telemunications panies witnessed tremendous spikes in cellular voice service usage. Verizon Wireless, for example, reported voice traffic rate increases of up to 100% above typical levels。 Cingular Wireless recorded an increase of up to 1000% on calls destined for the Washington . area [44]. While these works are engineered to handle 毕业设计(论文) 外文翻译 9 elevated amounts of traffic, the sheer number of calls was far greater than capacity for voice munications in the affected areas. However, with voicebased phone services being almost entirely unavailable due to TCH saturation, SMS messages were still successfully received in even the most congested regions because the control channels responsible for their delivery remained available. Text messaging allowed the lines of munication to remain open for many individuals in need in spite of their inability to plete voice calls. Accordingly, SMS messaging is now viewed by many as a reliable method of munication when all other means appear unavailable. A high number of call initiations at a given base station slows this response as the RACH is a shared access channel running the Slotted Aloha protocol Due to this proliferation of text messaging, we analyze Interoriginated, SMS attacks and their effects on voice and other services in cellular works. We first characterize these systems through an extensive study of the available standards documentation and graybox testing. From this data, we discuss a number of attacks and the susceptibility of mobile phone works to , from graybox testing,we assess the resilience of these works to these attacks. Before discussing the specifics of any attack on cellular works, it is necessary to examine the。
阅读剩余 0%
本站所有文章资讯、展示的图片素材等内容均为注册用户上传(部分报媒/平媒内容转载自网络合作媒体),仅供学习参考。 用户通过本站上传、发布的任何内容的知识产权归属用户或原始著作权人所有。如有侵犯您的版权,请联系我们反馈本站将在三个工作日内改正。