ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
Security Implications and Considerations for Femtocells
PDF

Keywords

3GPP
cellular
femtocells
security

How to Cite

[1]
J. . Chen and M. . Wong, “Security Implications and Considerations for Femtocells”, JCSANDM, vol. 1, no. 1, pp. 21–36, Jan. 2012.

Abstract

A Femto system is able to provide new services with higher data rate at relatively lower cost than traditional cellular system. Operators have already indicated their interest in this area and the number of deployments is ever increasing. Security is a critical part of Femto in all aspects of the operation of Femto services. In this paper, we analyze the security of Femto based on 3GPP system architecture. In addition, we will look into the details of other security aspects of Femto system, including security requirement and security mechanism.

https://doi.org/10.13052/jcsm2245-1439.112
PDF

References

3GPP TS 33.320 v0.2.0: “3GPP Security Aspect of Home NodeB and Home eNodeB; Release 9”.

The Hacker’s Choice, http://wiki.thc.org/vodafone.

Ravishankar Borgaonkar, Nico Golde, Kévin Redon: “Femtocells: a Poisonous Needle in the Operator’s Hay Stack”, August, 2011

IETF RFC 4187: “Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)”.

IETF RFC 4306: “Internet Key Exchange (IKEv2) Protocol”.

IETF RFC 4739: “Multiple Authentication Exchanges in the Internet Key Exchange”, November 2006.

Downloads

Download data is not yet available.