Abstract
The development of computing technologies has made it possible not only to expand the range of mobile communication services, but also to significantly increase computing capabilities. The emergence of mobile Internet, 4G, 5G technologies makes it possible to talk about a fundamentally different approach to ensuring the quality of service to network customers, creating fundamentally new approaches to ensuring the efficiency and reliability of transmitted information flows. However, such a rapid growth of GSM technologies without the introduction of security services leads to active actions of attackers and cyber terrorists, the emergence of new and modification of known threats. Mobile communication channels are used by cybercriminals for selfish purposes of access to database resources not only of the mobile Internet, but also to the databases of information and communication systems and networks. The article proposes a fundamentally new approach to ensuring the closure of the voice channel of the mobile Internet based on post-quantum cryptography algorithms – McEliece and Niederreiter crypto-code constructions on elliptic codes. This approach provides not only the offline mode of closing the voice channel and creating a VPN channel in tunnel mode, but also the required level of cryptographic strength in the face of the emergence of full-scale quantum computers.
Highlights
Computing resources have made it possible to significantly expand the capabilities of mobile communications, combining them with cyberspace into a single sphere of ensuring the growing needs of the world community
With all the advantages, there is a significant drawback - the almost complete absence of security services, which largely does not allow users to receive the required level of service quality. This disadvantage is inherent in the new generation networks of 4G – 6G technology based on the Diameter protocol
Mobile applications based on GSM technologies and LTE / SAE technologies lack mechanisms that provide security services - confidentiality and integrity
Summary
Computing resources have made it possible to significantly expand the capabilities of mobile (cellular) communications, combining them with cyberspace into a single sphere of ensuring the growing needs of the world community. With all the advantages, there is a significant drawback - the almost complete absence of security services, which largely does not allow users to receive the required level of service quality This disadvantage is inherent in the new generation networks of 4G – 6G technology based on the Diameter protocol. This protocol provides 3A services (identification, authorization and authentication), the provision of confidentiality services (ensuring the protection of information during transmission from passive attacks), and integrity (ensuring protection during storage and the possibility of modification only by an authorized user in networks based on the Diameter protocol is not provided) This approach allows attackers to use mobile Internet channels as channels of information leakage, and as the main channels of access to computer networks and systems [1–6].
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have