3G Design Decisions Quiz

BraveUnicorn avatar
BraveUnicorn
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What was the deliberate design decision in 3G regarding user traffic and signaling traffic?

Signaling traffic was considered more security critical than user traffic.

How is a security breach in an SGSN or RNC in one 3G network different from EPS?

In 3G, a security breach has no impact on other 3G networks, while in EPS, it may affect other networks.

What was the key improvement introduced in EPS to address the issue of session keys being handed from one RNC to another?

Cryptographic network separation of authentication material

What is the primary security focus under Network access security in 5G?

<p>Authentication, Integrity, and Ciphering of Signaling and data</p> Signup and view all the answers

How does handling of session keys differ between 3G and EPS networks?

<p>Session keys are handled by eNBs at the edge of access networks in EPS but not in 3G.</p> Signup and view all the answers

What was the reason for introducing forward security in handovers in EPS networks?

<p>To mitigate risks associated with handling session keys at vulnerable locations</p> Signup and view all the answers

What are the temporary identifiers used in 3G systems and 4G/5G systems respectively?

<p>TMSI and GUTI</p> Signup and view all the answers

In which situation is authentication through temporary identifiers not possible?

<p>During the first-time registration with a network</p> Signup and view all the answers

What kind of attacks are known as 'IMSI catching' attacks?

<p>Attacks that force revealing long-term identity</p> Signup and view all the answers

What has the 3GPP decided to address regarding IMSI Catchers in 5G?

<p>To address the privacy problem despite backward compatibility impacts</p> Signup and view all the answers

In 5G security specifications, what is not allowed over the radio interface?

<p>Plain-text transmissions of SUPI</p> Signup and view all the answers

What does an active man-in-the-middle adversary aim to achieve in relation to temporary identifiers?

<p>Preventing the disclosure of long-term identity</p> Signup and view all the answers

Why is the use of a digital air interface important in GSM?

<p>It enables tighter frequency re-use patterns and minimizes interference problems.</p> Signup and view all the answers

What security feature in GSM identifies the Mobile Equipment (ME) uniquely?

<p>Unique number coded into the ME</p> Signup and view all the answers

In GSM, how is the Mobile Subscriber authenticated?

<p>By a smart card known as a Subscriber Identity Module (SIM)</p> Signup and view all the answers

What is the main function of the VLR in GSM networks?

<p>Allocation of new Temporary Mobile Subscriber Identity (TMSI) numbers</p> Signup and view all the answers

Why is the frequent updating of Temporary Mobile Subscriber Identity (TMSI) important for GSM subscribers?

<p>To enhance privacy and security by making it difficult for calls to be traced.</p> Signup and view all the answers

More Quizzes Like This

UMTS Network Introduction
14 questions
2G and 3G Network Technologies
10 questions

2G and 3G Network Technologies

DetachableInterstellar avatar
DetachableInterstellar
Безпека 3G-5G та LTE
10 questions

Безпека 3G-5G та LTE

UncomplicatedFibonacci avatar
UncomplicatedFibonacci
PT110 - Lesson 3g-i
20 questions
Use Quizgecko on...
Browser
Browser