Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Third Generation Security System - 2,558 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

The security in the 3 G system In November 4 7, in 2002, there was a conference, devoted to 3 G Readiness. All the leaders of the mobile communication market gathered there. From that time the 3 G system became of great interest among the people of the 21 st generation. (7: 1) INTRODUCTION 3 G (The third generation Mobile Telephony) is an innovation in mobile phone system. It takes over the current GSM (Global System Mobile). The goal of the new system (3 G) is to launch multimedia services to the user in the mobile sphere.

The system is much better then todays (2 G) networks. It provides users with high quality services and its connection is quicker. The main purpose of this report is to show the development of the 3 G system and the importance of its security. (6: 93) I. HISTORICAL BACKGROUND The beginning of 3 Gs history can be regarded to 1980 's when the first mobile phone appeared in the market.

But later it was replaced by the current system. It is known as GSM that is used nowadays. For the last decade a great number of different service are being used such as Short Messaging Service (SMS), picture messaging, Wireless Application Protocol (WAP) and others. And 3 G was developed from them. (4: 1) For a long time a lot of people used the current 2 G system (GSM and PCS). They thought it was more beneficial. (5: 1) They were not in a hurry to change their current phones and felt themselves quite happy with them. The problem was that for many people mobile connection was necessary only for calling and receiving voice call and using text messaging.

Like any innovation 3 G system had to wait till people felt necessity in it. Until that time the customer waited and did not pay great attention to the services that were proposed by 3 G system. As it was pointed the main disadvantage, that scared away the customers, was the high cost of the services. The price, they would have to pay monthly as subscribers, were higher in compare with the current ones. (4: 1) In that case the operators would suffer great losses. The license for 3 G and its infrastructure cost a huge amount of money. For business subscriber the system had a large range of services for driving information because they often used the phone for data capability.

But the ordinary customer used the phone only for getting and sending massages. Frankly speaking there were only several providers who had already launched the 3 G service. Though 3 G system was an example of a genius technological invention of the third generation but probably it was more popular with teenagers and business persons: it gave a great fun for teenagers and a useful service for the rest. (4: 2) There were several ways out from 3 G system problems. For example, the providers of the system tried to make it more available for some services it was limited. The system could be automatically connected to the GSM network or any available network.

In that case a customer could not use 3 G features but the system was available for voice and sending texts. It attracted more customers to join the 3 G. (4: 2) II THE PERFORMANCE OF 3 G SERVICES It should be mentioned that there is a difference between 3 G network and 3 G services. The last ones are data centric. They provide the user with multimedia advances. The services like the delivery of data, music, graphical images and real-time video was driven from the Internet.

So, the problems which follow the system are more like the problems of the Internet services. (5: 2) There are several advantages and disadvantages in the system to the current GSM system. Live video calling, pinpoint mapping and video messaging were created and increased the capabilities of the modern mobile service. But there are some disadvantages, and the main two are the expensiveness of the system and its limited possibilities: for some services there is limited coverage; at present, not every country has 3 G system; and the most important problem for users is the life expectancy of battery. (5: 2) But in spite of all disadvantages the system has got universal acclaim. Due to the system 3 G a user can not only talk with the other person but also see he or she. It is became available because of live video calling service. This service can be used not only for making video calling.

If you need somebody's advise you should not explain everything but only move the camera close to the object. (9: 2) The other advantage is pinpoint mapping service. With the help of this service a user can determine the location and the system will lead him or her to the places they request on their handset. You can find the nearest shops, banks, post offices etc. It is of great importance when you are in unknown place. As busy persons we often have to travel. This feature can provide us with full amount of information including such services as finding a certain street or even calculating your distance from the city center. (4: 2) The principles of work of Video messaging is alike as normal Short Messaging Service, but a user not only send a message, but also send his recording video.

We dont need to press the keys or combine texts. The only thing we have to do is to make a short clip video. The handsets, nowadays available in the market, have different features and are also multi network. If there is on connection with 3 G network they can connect with normal GSM network. As to the design the current 3 G handsets are bigger and thicker than normal GSM ones.

They seem to run all the services that the customers expect to get. By the way, the current 3 G handsets are supplied with, built-in up to two cameras, a bigger screen and can send video calls and record video messages. (6: 98) As it was said 3 G network can provide a lot of services than the current GSM network, such as video calling, video messaging, video content and pin-point mapping. But the most useful advantage that the system can provide is its access to the Internet. Most services provided by 3 G operators are based on it. It goes without saying, that the Internet is a great source of huge business incomes as well as widely used for sending data and information. (6: 99) All the services which 3 G system includes attract the customer and causes the rise and the development of new technologies.

For the last decades the 3 G service has been claiming as number one among 60 percents of the population; as well as almost 90 percents of the population have been covered with its voice capability. The figures are impressive, taking into account the fact that the provider is a newly born one. (6: 98) III. SG SECURITY SYSTEM With the growth of new technologies in the mobile world there is a thread that can be caused by various viruses as well as computer data hazards. It is well known that protection is better than treatment. Different Antivirus programs were created in order to stop mail ware attacks. They are used to protect ISP (Internet Service Providers) and database application servers. (1: 6) But statistic is sad.

The negative influence of net hazards increases every day. The providers wish that only the advantages of the 3 G technology should get to the user. With the purpose of safety communication antivirus software was invented and applied to satisfy mobile environment requirements. It will help to balance flexibility and security of mobile systems and protect valuable data.

The goal of the report is to evaluate current 3 G security system and show the impact of security deployment upon mobile connection. (7: 3) 3 G security system is based on GSM security or the security of second generation. But previous measures are not optimum nowadays and cannot satisfy the increasing needs of the third generation. 2 G security system was build on end-to-end security standards. Their main functions were to provide privacy, integrity and confidentiality. The main principles were extended to 3 G networks though some of them were evolved with the next generation 3 G services. The main purpose for the changes were in guarantee continued transparent secure communication. The creation of IP-based 3 G networks became a real challenge to former end-to-end encrypted multimedia approach. (2: 10) As it was mentioned the main principles of 3 G security system are to ensure privacy, integrity and confidentiality, there are other tasks which should be taken into consideration.

Among them there is a task to correct problems with GSM security and the next one is to continue creation of new security features. It is very important, especially nowadays when it is difficult to imagine a person without modern means of mobile connection. And the measures should be taken as quicker as it is possible because, as it was said, there is a great number of net hazards. (7: 1) GSM Security System is the basis for the current one. And before inventing 3 G system providers should carefully examine the main problems of 2 G security system. While managing the system impersonating network elements were possible. The next problem was that encryption was the main measure for protection against radio channel hijack.

There was a lack of visibility, so the user had no information if encryption was on. The forth problem was in inflexibility of the system. It was not available for some upgrade and for improvement of security functionality. All the problems were examined carefully and new security features were innovated.

And till the present time the system is being constantly improved by the providers of 3 G mobile communication. (9: 8) 3 G new security features include several key features. First of all the user got the opportunity to identify the network. The process was called Network Authentication and is of great importance while receiving data. The notion like integrity algorithms came into existence with the purpose to assure explicitly of data integrity. 3 G security system included the features for securing services and applications. The features help to protect the system against misuse of services and provide it with security for applications resident on USIM (Universal Subscriber Identity Module). 3 G security system is more flexible. If new threats and services appear security features can be quickly improved enhanced.

For users there is no problem to notify if security is on and to determine the level of security. By the way, security features can be selected for individual services. These features provide visibility and configurability of the system. (2: 14) But in spite of great amount of innovations there are some problems which should be solved as quickly as it is possible. First of all there is no protection for the transmission of International Mobile Equipment Identity (IMEI). The next one is that clear text is used for subscriber identity (IMSI International Mobile Subscriber Identity) while sending data to safety testing machines, or using software or hardware. Test measurement System (TMSI) is specialized on such machines and software etc.

to the user. A user can make a false connection. Because of it he or she can be out of reach of the paging signals. If encryption is disabled a user can get hijacking outgoing / incoming calls. So, it is clear that 3 G security system should be developed and improved.

The users and providers of mobile connection must be assured that the communicating party is identified right. Users as well as significant data must be protected. And for this confidentiality and integrity mechanism of 3 G security system must be widely used. (6: 100) There are a lot of good examples in which the security system of new generation was applied. For sample, Roke Manor Research company in the UK can be taken. It was founded in 1956 and since that time the company has been provided the most innovative technologies in wireless. It was one of the first that used electronic sensors in network technology.

The company accumulates world-class talent and experience and uses innovative and timely solutions to their commercial development needs. It is constantly improving the system of security to protect its data and clients. (2: 17) Airline companies are in the first range of the list of those who need badly modern security system. The usage of new technologies can guarantee safety and security. They are necessary for supporting airline operational and passenger services. In 2000, Roke Manor Research company created the Siemens demonstrator. They used the great potential which was offered by third generation technologies.

The innovation was used for providing safety and security of crew and passengers. The demonstrators fulfill several functions. First of all they help to protect measurement results from interference. Then they provide useful input to the standardization process. (3: 20) The company proved that Third generation technologies could be widely used for processes on-board and could guarantee continually monitored activity on-board for security purposes. The result of the innovation was great. The confidence in the safety of air travel is consolidated.

Nowadays there is another project which is based on the possibility to transfer a limited amount of data between the air and ground. Third generation communications propose to extend the exchange with data at much higher data level with using voice communications. (1: 8) The other innovation was made by Motorola Company. Its handset has very important feature useful for business customers. The handsets are provided with tri-band network (is capable to roams to US). The usage of Secure Digital cards (SD cards) made it possible to swap memory. (4: 3) CONCLUSION Having examining all pros and cons of the system, it goes without saying that the discovery of 3 G system was a revolution of mobile connection.

With the help of 3 G service it became possible to put various aspects of multimedia into a small device. The latest researches show that our business and leisure can be changed and provided with several significant advantages. At present we have instant access to information, services and entertainment in any place and at any time. The future of 3 G system is certain. It seems to replace GSM network. And the network providers try to do their best to supply customers with really qualitative and safety type of service. 3 G system gains popularity because it satisfies the customers expectations. (6: 100) Bibliography: 3 G TS 33. 120 Security Principles and Objectives web 3 G TS 33. 120 Security Threats and Requirements web 3 G TR 33. 900 A Guide to 3 rd Generation Security ftp: //ftp. 3 gpp.

org/TSGSA/WG 3 Security/Specs/ 3390 0 - 120. 3 G Mobile Telecommunications: What is 3 G? Politics Unspun, Dec. , 2005. web 3 G Cell Phones: Still To Come. Technology Report, Feb. , 2002. web K. W.

Richardson. UMTS overview. Electronics & Communication Engineering Journal, June, 2000. Some points were taken from these interviews: Security next step: threats and trends carried forth by RAV Division CEO.

Bucharest. PRESS RELEASE November 7, 2002 web


Free research essays on topics related to: great importance, main purpose, security system, third generation, g mobile

Research essay sample on Third Generation Security System

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com