3G Design Decisions Quiz
17 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What was the deliberate design decision in 3G regarding user traffic and signaling traffic?

  • Both user and signaling traffic were considered equally security critical.
  • User traffic was considered more security critical than signaling traffic.
  • User traffic was not considered at all in terms of security.
  • Signaling traffic was considered more security critical than user traffic. (correct)
  • How is a security breach in an SGSN or RNC in one 3G network different from EPS?

  • Both 3G and EPS networks are equally vulnerable to security breaches.
  • There is no difference between the impact of a breach in 3G and EPS networks.
  • In 3G, a breach affects all 3G networks, while in EPS, the impact is limited to the breached network.
  • In 3G, a security breach has no impact on other 3G networks, while in EPS, it may affect other networks. (correct)
  • What was the key improvement introduced in EPS to address the issue of session keys being handed from one RNC to another?

  • Cryptographic network separation of authentication material (correct)
  • Introduction of session keys CK, IK
  • Handling session keys at the edge of access networks
  • Assumption that an RNC compromise would be rare
  • What is the primary security focus under Network access security in 5G?

    <p>Authentication, Integrity, and Ciphering of Signaling and data</p> Signup and view all the answers

    How does handling of session keys differ between 3G and EPS networks?

    <p>Session keys are handled by eNBs at the edge of access networks in EPS but not in 3G.</p> Signup and view all the answers

    What was the reason for introducing forward security in handovers in EPS networks?

    <p>To mitigate risks associated with handling session keys at vulnerable locations</p> Signup and view all the answers

    What are the temporary identifiers used in 3G systems and 4G/5G systems respectively?

    <p>TMSI and GUTI</p> Signup and view all the answers

    In which situation is authentication through temporary identifiers not possible?

    <p>During the first-time registration with a network</p> Signup and view all the answers

    What kind of attacks are known as 'IMSI catching' attacks?

    <p>Attacks that force revealing long-term identity</p> Signup and view all the answers

    What has the 3GPP decided to address regarding IMSI Catchers in 5G?

    <p>To address the privacy problem despite backward compatibility impacts</p> Signup and view all the answers

    In 5G security specifications, what is not allowed over the radio interface?

    <p>Plain-text transmissions of SUPI</p> Signup and view all the answers

    What does an active man-in-the-middle adversary aim to achieve in relation to temporary identifiers?

    <p>Preventing the disclosure of long-term identity</p> Signup and view all the answers

    Why is the use of a digital air interface important in GSM?

    <p>It enables tighter frequency re-use patterns and minimizes interference problems.</p> Signup and view all the answers

    What security feature in GSM identifies the Mobile Equipment (ME) uniquely?

    <p>Unique number coded into the ME</p> Signup and view all the answers

    In GSM, how is the Mobile Subscriber authenticated?

    <p>By a smart card known as a Subscriber Identity Module (SIM)</p> Signup and view all the answers

    What is the main function of the VLR in GSM networks?

    <p>Allocation of new Temporary Mobile Subscriber Identity (TMSI) numbers</p> Signup and view all the answers

    Why is the frequent updating of Temporary Mobile Subscriber Identity (TMSI) important for GSM subscribers?

    <p>To enhance privacy and security by making it difficult for calls to be traced.</p> Signup and view all the answers

    More Like This

    2G and 3G Network Technologies
    10 questions

    2G and 3G Network Technologies

    DetachableInterstellar avatar
    DetachableInterstellar
    Безпека 3G-5G та LTE
    10 questions

    Безпека 3G-5G та LTE

    UncomplicatedFibonacci avatar
    UncomplicatedFibonacci
    Use Quizgecko on...
    Browser
    Browser