scholarly journals MIME Type Registrations for 3rd Generation Partnership Project (3GPP) Multimedia files

Author(s):  
R. Castagno ◽  
D. Singer
2013 ◽  
Vol 8 (15) ◽  
pp. 33-40
Author(s):  
Javier Enrique Arévalo Peña

En la planeación de las próximas generaciones de redes inalámbricas es importante contar con estudios de radio propagación que permitan establecer diseños adecuados para ofrecer los servicios proyectados por las nuevas tecnologías a los usuarios móviles. En este artículo se presentan aspectos relacionados con el comportamiento de cobertura de radio propagación del modelo propuesto por el 3GPP (3rd Generation Partnership Project) para un entorno urbano en una red LTE (Long Term Evolution) empleando sistemas de antenas convencionales y sistemas de antena adaptativas (AAS). Para ello se utiliza la herramienta de software ICS Designer y se establece como escenario los alrededores la Fundación Universidad Autónoma de Colombia ubicada en el centro urbano de la ciudad de Bogotá D. C.


2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 962 ◽  
Author(s):  
Usman Ali Khan ◽  
Sang Sun Lee

Device-to-Device (D2D) communication is the major enabler of Vehicle-to-Everything communication in 3rd Generation Partnership Project (3GPP) Release 14. The user equipment/device can engage either in direct communication with the infrastructure, use a relay node, or it can communicate directly with another device with or without infrastructure support. The user equipment can be either a hand-held cellular device or a moving vehicle. The coexistence of cellular user equipment with the vehicular user equipment imposes different Quality of Service (QOS) requirements due to the rapid mobility of the vehicles and interference. Resource allocation is an important task by which the user equipment is allocated the required resources based on different QOS parameters. In this paper, we introduced the case of three types of users which share uplink resources: two types of vehicular users, and a third user that acts as a handheld cellular phone, which is nearly static. By keeping in mind, the differential QOS requirements for the three types of users, we have calculated the optimum power and then applied a 3-dimensional graph-based matching and hypergraph coloring based resource block (RB) allocation.


2016 ◽  
Vol 2016 (4) ◽  
pp. 255-275 ◽  
Author(s):  
Pierre-Alain Fouque ◽  
Cristina Onete ◽  
Benjamin Richard

Abstract Proposed by the 3rd Generation Partnership Project (3GPP) as a standard for 3G and 4G mobile-network communications, the AKA protocol is meant to provide a mutually-authenticated key-exchange between clients and associated network servers. As a result AKA must guarantee the indistinguishability from random of the session keys (key-indistinguishability), as well as client- and server-impersonation resistance. A paramount requirement is also that of client privacy, which 3GPP defines in terms of: user identity confidentiality, service untraceability, and location untraceability. Moreover, since servers are sometimes untrusted (in the case of roaming), the AKA protocol must also protect clients with respect to these third parties. Following the description of client-tracking attacks e.g. by using error messages or IMSI catchers, van den Broek et al. and respectively Arapinis et al. each proposed a new variant of AKA, addressing such problems. In this paper we use the approach of provable security to show that these variants still fail to guarantee the privacy of mobile clients. We propose an improvement of AKA, which retains most of its structure and respects practical necessities such as key-management, but which provably attains security with respect to servers and Man-in-the- Middle (MiM) adversaries. Moreover, it is impossible to link client sessions in the absence of client-corruptions. Finally, we prove that any variant of AKA retaining its mutual authentication specificities cannot achieve client-unlinkability in the presence of corruptions. In this sense, our proposed variant is optimal.


2020 ◽  
Vol 16 (2) ◽  
pp. 155014772090975
Author(s):  
Yoohwa Kang ◽  
Changki Kim ◽  
Donghyeok An ◽  
Hyunsoo Yoon

Various technologies have been developed for the efficient use of the multiple radio access technologies resource at the radio access network level or other network levels to improve user service quality in mobile communication networks. In long-term evolution, mobile carriers are commercializing radio access network-level traffic aggregation technologies such as licensed-assisted access-long-term evolution, long-term evolution-unlicensed, and long-term evolution-wireless local area network aggregation, which use the multi-accesses of the 3rd Generation Partnership Project and WiFi, and the multipath transmission control protocol–based traffic aggregation technologies at the L3 network level. The standardization of 3rd Generation Partnership Project Release 16, which is scheduled to be completed by 2020, is under progress to support the traffic aggregation technology at the L3 network level through a multi-access 5G network. Multipath transmission control protocol is also considered as a traffic aggregation technology. However, it is difficult to apply the multipath transmission control protocol employment model used in long-term evolution to the 5G network structure as it is due to the change to a common core architecture that accommodates multiple radio access technologies through one common interface. Therefore, this article proposes an optimal 5G system architecture and a multipath transmission control protocol adaptation method to support the access traffic steering function based on multipath transmission control protocol in a 3rd Generation Partnership Project 5G mobile communication network. We have verified the development of the multipath transmission control protocol–based multi-access traffic steering technology by implementing the proposed solution in a commercial server on a testbed based on the 5G system standard of 3rd Generation Partnership Project Release 15. Furthermore, this article defines problems that occur when implementing the multipath transmission control protocol–based multi-access traffic steering system and proposes relevant solutions. Based on the implementation results, it is demonstrated that the proposed multipath transmission control protocol–based multi-access traffic steering system can perform traffic steering in the 3rd Generation Partnership Project 5G network.


2017 ◽  
Vol 2017 (1) ◽  
pp. 11281
Author(s):  
Magnus Johansson ◽  
Matts Karreman ◽  
Amalia Foukaki

2020 ◽  
Author(s):  
Hudson Lopes ◽  
Flávio Rocha

Utilizando o algoritmo de Levenberg-Marquardt (LM) para estimação de parâmetros, apresentamos neste artigo as funções de utilidade sigmoidal que modelam a probabilidade de sucesso por unidade de potência consumida por um usuário. A simulação é proposta em redes móveis para os usuários localizados sob a área de cobertura das pequenas células, com uma faixa de 3,5 GHz e com diferentes Esquemas de Modulação e Codificação (MCS - Modulation and Coding Schemes) padronizados no Projeto de Parceria de Terceira Geração (3GPP - 3rd Generation Partnership Project).


2020 ◽  
Author(s):  
Vui Huang Tea

The 3rd Generation Partnership Project (3GPP) standard for 5G telecommunications specifies privacy protection schemes to cryptographically encrypt and conceal permanent identifiers of subscribers to prevent them from being exposed and tracked by over-the-air eavesdroppers. However, conventional privacy-preserving protocols and architectures alone are insufficient to protect subscriber privacy as they are vulnerable to new types of attacks due to the utilization of the emerging technologies such artificial intelligence (AI). A conventional brute force attack to unmask concealed 5G identity using a CPU would require ~877 million years. This paper presents an apparatus using machine learning (ML) and a graphics processing unit (GPU) that is able to unmask a concealed 5G identity in ~12 minutes with an untrained neural-network, or ~0.015 milliseconds with a pre-trained neural-network. The 5G concealed identities are effectively identified without requiring decryption, hence severely diminishing the level of privacy-preservation. Finally, several ML defence countermeasures are proposed to re-establish privacy protection in 5G identity.


Author(s):  
Ibrahim Ghafir ◽  
Mohammad Hammoudeh ◽  
Vaclav Prenosil

Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multi-step attack. Within the APT life cycle, the most common technique used to get the point of entry is spear-phishing emails which may contain disguised executable files. This paper presents the disguised executable file detection (DeFD) module, which aims at detecting disguised exe files transferred over the connections. The detection is based on a comparison between the MIME type of the transferred file and the file name extension. This module was experimentally evaluated and the results show successful detection of disguised executable files.


Sign in / Sign up

Export Citation Format

Share Document